{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:58:55Z","timestamp":1764997135673,"version":"3.46.0"},"reference-count":25,"publisher":"Walter de Gruyter GmbH","issue":"5","license":[{"start":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T00:00:00Z","timestamp":1507939200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,9,25]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Steganography is the foremost influential approach to hide data. Images serve as the most appropriate cover media for steganography. This paper intends to do a performance evaluation of color images and its comparison with the recently proposed approaches, using the modified technique already proposed for grayscale images, by the authors. This approach hides large data in color image using the blocking concept. The blocking process is applied on approximation coefficients of secret image and detail coefficients of red, green and blue components of cover image. The blocks of detail coefficients are replaced with approximation coefficients of secret image using root mean square error method. The key is used to store the position of best matching blocks. It is being predicated that the work will be able to hide large data in a single image. The stego image (ST) has better visual quality based on the peak signal to noise ratio values.<\/jats:p>","DOI":"10.1515\/jisys-2017-0134","type":"journal-article","created":{"date-parts":[[2017,10,14]],"date-time":"2017-10-14T06:02:12Z","timestamp":1507960932000},"page":"749-758","source":"Crossref","is-referenced-by-count":6,"title":["Performance Evaluation of Modified Color Image Steganography Using Discrete Wavelet Transform"],"prefix":"10.1515","volume":"28","author":[{"given":"Vijay","family":"Kumar","sequence":"first","affiliation":[{"name":"Department of Computer Science and Engineering , Thapar University , Patiala , Punjab , India"}]},{"given":"Dinesh","family":"Kumar","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Engineering , Guru Jambheshwar University of Science & Technology , Hisar, Haryana , India"}]}],"member":"374","published-online":{"date-parts":[[2017,10,14]]},"reference":[{"key":"2025120523422730185_j_jisys-2017-0134_ref_001_w2aab3b7b7b1b6b1ab1b5b1Aa","doi-asserted-by":"crossref","unstructured":"A. A. Abdelwahab and L. A. Hassaan, A discrete wavelet transform based technique for image data hiding, in: Proceedings of 25th National Radio Science Conference, pp. 1\u20139, Egypt, 2008.","DOI":"10.1109\/NRSC.2008.4542319"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_002_w2aab3b7b7b1b6b1ab1b5b2Aa","doi-asserted-by":"crossref","unstructured":"D. Baby, J. Thomas, G. Augustine, E. George and N. R. Michael, A novel DWT based image securing method using steganography, Procedia Comput. Sci.46 (2015), 612\u2013618.10.1016\/j.procs.2015.02.105","DOI":"10.1016\/j.procs.2015.02.105"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_003_w2aab3b7b7b1b6b1ab1b5b3Aa","doi-asserted-by":"crossref","unstructured":"Y. Bassil, Image steganography based on a parameterized canny edge detection algorithm, Int. J. Comput. Appl.60 (2012), 35\u201340.","DOI":"10.5120\/9682-4112"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_004_w2aab3b7b7b1b6b1ab1b5b4Aa","doi-asserted-by":"crossref","unstructured":"C. K. Chan and L. M. Cheng, Hiding data in image by simple LSB substitution, Pattern Recognit.37 (2003), 469\u2013471.","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_005_w2aab3b7b7b1b6b1ab1b5b5Aa","doi-asserted-by":"crossref","unstructured":"A. Cheddad, J. Condell, K. Curran and P. M. Kevitt, Digital image steganography: survey and analyses of current methods, Signal Process.90 (2010), 727\u2013752.10.1016\/j.sigpro.2009.08.010","DOI":"10.1016\/j.sigpro.2009.08.010"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_006_w2aab3b7b7b1b6b1ab1b5b6Aa","doi-asserted-by":"crossref","unstructured":"W.-J. Chen, C.-C. Chang and T. H. N. Le, High payload steganography mechanism using hybrid edge detector, Expert Syst. Appl.37 (2010), 3292\u20133301.10.1016\/j.eswa.2009.09.050","DOI":"10.1016\/j.eswa.2009.09.050"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_007_w2aab3b7b7b1b6b1ab1b5b7Aa","doi-asserted-by":"crossref","unstructured":"M. Ghebleh and A. Kanso, A robust chaotic algorithm for digital image steganography. Commun. Nonlinear Sci. Numer. Simult.19 (2014), 1898\u20131907.10.1016\/j.cnsns.2013.10.014","DOI":"10.1016\/j.cnsns.2013.10.014"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_008_w2aab3b7b7b1b6b1ab1b5b8Aa","doi-asserted-by":"crossref","unstructured":"B. L. Gunjal and S. N. Mali, MEO based secured, robust, high capacity and perceptual quality image watermarking in DWT-SVD domain, SpringerPlus4 (2015), 126.10.1186\/s40064-015-0904-z","DOI":"10.1186\/s40064-015-0904-z"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_009_w2aab3b7b7b1b6b1ab1b5b9Aa","unstructured":"S. Hemalatha, U. D. Acharya, R. Adige and P. Kamath, An integer wavelet transform based steganography technique for color images, Int. J. Inf. Comput. Technol.3 (2013), 13\u201324."},{"key":"2025120523422730185_j_jisys-2017-0134_ref_010_w2aab3b7b7b1b6b1ab1b5c10Aa","doi-asserted-by":"crossref","unstructured":"A. Ioannidou, S. T. Halkidis and G. Stephanides, A novel technique for image steganography based on a high payload method and edge detection, Expert Syst. Appl.39 (2012), 11517\u201311524.10.1016\/j.eswa.2012.02.106","DOI":"10.1016\/j.eswa.2012.02.106"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_011_w2aab3b7b7b1b6b1ab1b5c11Aa","doi-asserted-by":"crossref","unstructured":"H. R. Kanan and B. Nazeri, A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm, Expert Syst. Appl.41 (2014), 6123\u20136130.10.1016\/j.eswa.2014.04.022","DOI":"10.1016\/j.eswa.2014.04.022"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_012_w2aab3b7b7b1b6b1ab1b5c12Aa","doi-asserted-by":"crossref","unstructured":"S. M. M. Karim, M. S. Rahman and M. I. Hossain, A new approach for LSB based image steganography using secret key, in: Proc. International Conference on Computer and Information Technology, pp. 286\u2013291, Dhaka, Bangladesh, 2011.","DOI":"10.1109\/ICCITechn.2011.6164800"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_013_w2aab3b7b7b1b6b1ab1b5c13Aa","doi-asserted-by":"crossref","unstructured":"V. Kumar and D. Kumar, Digital image Steganography based on combination of DCT and DWT, in: Information and Communication Technologies, V. V. Das and R. Vijaykumar, eds., pp. 596\u2013601, Springer, 2010.","DOI":"10.1007\/978-3-642-15766-0_102"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_014_w2aab3b7b7b1b6b1ab1b5c14Aa","doi-asserted-by":"crossref","unstructured":"D. Kumar and V. Kumar, Improving the performance of color image watermarking using contourlet transform, in: Advances in Computer Science and Information Technology, N. Meghanathan, B. K. Kaushik and D. Nagamalai, eds., pp. 256\u2013264, Springer-Verlag, Berlin, 2011.","DOI":"10.1007\/978-3-642-17857-3_26"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_015_w2aab3b7b7b1b6b1ab1b5c15Aa","doi-asserted-by":"crossref","unstructured":"V. Kumar and D. Kumar, A modified DWT-based image steganography technique, Multimed. Tools Appl. 2017, In Press.","DOI":"10.1007\/s11042-017-4947-8"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_016_w2aab3b7b7b1b6b1ab1b5c16Aa","doi-asserted-by":"crossref","unstructured":"R. T. McKeon, Strange Fourier steganography in movies, In: Proc. IEEE International Conference on Electro\/Information Technology, pp. 178\u2013182, 2007.","DOI":"10.1109\/EIT.2007.4374540"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_017_w2aab3b7b7b1b6b1ab1b5c17Aa","doi-asserted-by":"crossref","unstructured":"K. Muhammad, J. Ahmad, N. U. Rehman, Z. Jan and M. Sajjad, CISSKA-LSB: color image steganography using stego key-directed adaptive LSB substitution method, Multimed. Tools Appl. 76 (2017), 8597\u20138626.10.1007\/s11042-016-3383-5","DOI":"10.1007\/s11042-016-3383-5"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_018_w2aab3b7b7b1b6b1ab1b5c18Aa","doi-asserted-by":"crossref","unstructured":"D. Ou and W. Sun, High payload image Steganography with minimum distortion based on absolute moment block truncation coding, Multimed. Tools Appl.74 (2015), 9117\u20139139.10.1007\/s11042-014-2059-2","DOI":"10.1007\/s11042-014-2059-2"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_019_w2aab3b7b7b1b6b1ab1b5c19Aa","doi-asserted-by":"crossref","unstructured":"J. S. Pan, W. Li, C. S. Yang and L. J. Yan, Image Steganography based on subsampling and compressive sensing, Multimed. Tools Appl.74 (2015), 9191\u20139205.10.1007\/s11042-014-2076-1","DOI":"10.1007\/s11042-014-2076-1"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_020_w2aab3b7b7b1b6b1ab1b5c20Aa","doi-asserted-by":"crossref","unstructured":"S. Prasad and A. K. Pal, An RGB color image steganography scheme using overlapping block-based pixel value differencing, R. Soc. Open Sci.4 (2017), 161066.10.1098\/rsos.161066","DOI":"10.1098\/rsos.161066"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_021_w2aab3b7b7b1b6b1ab1b5c21Aa","doi-asserted-by":"crossref","unstructured":"S. Rubab and M. Younus, Improved image steganography technique for colored images using wavelet transform, Int. J. Comput. Appl.39 (2012), 29\u201332.","DOI":"10.5120\/4890-7381"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_022_w2aab3b7b7b1b6b1ab1b5c22Aa","doi-asserted-by":"crossref","unstructured":"A. A. Shejul and U. L. Kulkarni, A secure skin tone based steganography (SSTS) using wavelet transform, Int. J. Comput. Theory Eng.3 (2011), 16\u201322.","DOI":"10.7763\/IJCTE.2011.V3.277"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_023_w2aab3b7b7b1b6b1ab1b5c23Aa","doi-asserted-by":"crossref","unstructured":"G. Swain, Adaptive pixel value differencing steganography using both vertical and horizontal edges, Multimed. Tools Appl.75 (2016), 541\u2013556.","DOI":"10.1007\/s11042-015-2937-2"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_024_w2aab3b7b7b1b6b1ab1b5c24Aa","doi-asserted-by":"crossref","unstructured":"D.-C. Wu and W.-H. Tsai, A steganographic method for images by pixel-value differencing, Pattern Recognit. Lett.24 (2003), 1613\u20131626.10.1016\/S0167-8655(02)00402-6","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"2025120523422730185_j_jisys-2017-0134_ref_025_w2aab3b7b7b1b6b1ab1b5c25Aa","doi-asserted-by":"crossref","unstructured":"C.-Y. Yang and W.-F. Wang, Block based color image steganography using smart pixel-adjustment, Adv. Intell. Syst. Comput.329 (2015), 145\u2013154.","DOI":"10.1007\/978-3-319-12286-1_15"}],"container-title":["Journal of Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.degruyter.com\/view\/j\/jisys.2019.28.issue-5\/jisys-2017-0134\/jisys-2017-0134.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0134\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0134\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T23:42:59Z","timestamp":1764978179000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyterbrill.com\/document\/doi\/10.1515\/jisys-2017-0134\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,14]]},"references-count":25,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2017,10,17]]},"published-print":{"date-parts":[[2019,9,25]]}},"alternative-id":["10.1515\/jisys-2017-0134"],"URL":"https:\/\/doi.org\/10.1515\/jisys-2017-0134","relation":{},"ISSN":["2191-026X","0334-1860"],"issn-type":[{"type":"electronic","value":"2191-026X"},{"type":"print","value":"0334-1860"}],"subject":[],"published":{"date-parts":[[2017,10,14]]}}}