{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T15:24:17Z","timestamp":1770045857134,"version":"3.49.0"},"reference-count":23,"publisher":"SAGE Publications","issue":"5","license":[{"start":{"date-parts":[[2021,4,7]],"date-time":"2021-04-07T00:00:00Z","timestamp":1617753600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":["journals.sagepub.com"],"crossmark-restriction":true},"short-container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"published-print":{"date-parts":[[2021,11,17]]},"abstract":"<jats:p>In this paper, we propose a frequency domain data hiding method for the JPEG compressed images. The proposed method embeds data in the DCT coefficients of the selected 8\u00a0\u00d7\u00a08 blocks. According to the theories of Human Visual Systems \u00a0(HVS), human vision is less sensitive to perturbation of pixel values in the uneven areas of the image. In this paper we propose a Singular Value Decomposition based image roughness measure (SVD-IRM) using which we select the coarse 8\u00a0\u00d7\u00a08 blocks as data embedding destinations. Moreover, to make the embedded data more robust against re-compression attack and error due to transmission over noisy channels, we employ Turbo error correcting codes. The actual data embedding is done using a proposed variant of matrix encoding that is capable of embedding three bits by modifying only one bit in block of seven carrier features. We have carried out experiments to validate the performance and it is found that the proposed method achieves better payload capacity and visual quality and is more robust than some of the recent state-of-the-art methods proposed in the literature.<\/jats:p>","DOI":"10.3233\/jifs-189877","type":"journal-article","created":{"date-parts":[[2021,4,9]],"date-time":"2021-04-09T12:11:03Z","timestamp":1617970263000},"page":"5571-5581","update-policy":"https:\/\/doi.org\/10.1177\/sage-journals-update-policy","source":"Crossref","is-referenced-by-count":1,"title":["A robust and high capacity data hiding method for JPEG compressed images with SVD-based block selection and advanced error correcting techniques"],"prefix":"10.1177","volume":"41","author":[{"given":"Kusan","family":"Biswas","sequence":"first","affiliation":[{"name":"New Delhi, India"}]}],"member":"179","published-online":{"date-parts":[[2021,4,7]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1147\/sj.353.0313"},{"key":"e_1_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1049\/el:20001429"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2003.08.007"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.4304\/jetwi.2.1.56-64"},{"key":"e_1_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00402-6"},{"key":"e_1_3_1_7_2","doi-asserted-by":"crossref","unstructured":"RoqueJ. J. and MinguetJ.M. Slsb: Improving the steganographic algorithm lsb In WOSIS (2009) 57\u201366.","DOI":"10.5220\/0002169700570066"},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.998"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-013-1832-y"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1002\/sec.864"},{"key":"e_1_3_1_11_2","unstructured":"UphamD. Jsteg. Software available at ftp. funet. fi (1997)."},{"key":"e_1_3_1_12_2","doi-asserted-by":"crossref","unstructured":"BanerjeeS. GhoshB.R. and RoyP. Jpeg steganography and steganalysis\u2013a review In Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 175\u2013187. Springer (2015).","DOI":"10.1007\/978-3-319-12012-6_20"},{"key":"e_1_3_1_13_2","doi-asserted-by":"crossref","unstructured":"SachnevV. KimH.J. and ZhangR. Less detectable jpeg steganography method based on heuristic optimization and bch syndrome coding In Proceedings of the 11th ACM workshop on Multimedia and security (2009) 131\u2013140.","DOI":"10.1145\/1597817.1597841"},{"key":"e_1_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6450-2"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7626-0"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4230-4"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7115-x"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym12060899"},{"key":"e_1_3_1_19_2","doi-asserted-by":"crossref","unstructured":"HighamN.J. Accuracy and stability of numerical algorithms. SIAM (2002).","DOI":"10.1137\/1.9780898718027"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.1993.397441"},{"key":"e_1_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.3390\/sym11111360"},{"key":"e_1_3_1_22_2","unstructured":"HagenauerJ. and HoeherP. A viterbi algorithm with soft-decision outputs and its applications In 1989 IEEE Global Telecommunications Conference and Exhibition\u2019 Communications Technology for the 1990s and Beyond\u2019 1680\u20131686. IEEE (1989)."},{"key":"e_1_3_1_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2006.879281"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189877","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/full-xml\/10.3233\/JIFS-189877","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.3233\/JIFS-189877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,2]],"date-time":"2026-02-02T03:18:32Z","timestamp":1770002312000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.3233\/JIFS-189877"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,7]]},"references-count":23,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,11,17]]}},"alternative-id":["10.3233\/JIFS-189877"],"URL":"https:\/\/doi.org\/10.3233\/jifs-189877","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,7]]}}}