{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T10:49:08Z","timestamp":1774435748735,"version":"3.50.1"},"reference-count":53,"publisher":"Tech Science Press","issue":"1","license":[{"start":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T00:00:00Z","timestamp":1729382400000},"content-version":"vor","delay-in-days":293,"URL":"https:\/\/doi.org\/10.32604\/TSP-CROSSMARKPOLICY"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2024]]},"DOI":"10.32604\/cmc.2024.050090","type":"journal-article","created":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T08:36:42Z","timestamp":1726043802000},"page":"183-211","update-policy":"https:\/\/doi.org\/10.32604\/tsp-crossmarkpolicy","source":"Crossref","is-referenced-by-count":11,"title":["High-Secured Image LSB Steganography Using AVL-Tree with Random RGB Channel Substitution"],"prefix":"10.32604","volume":"81","author":[{"given":"Murad","family":"Njoum","sequence":"first","affiliation":[]},{"given":"Rossilawati","family":"Sulaiman","sequence":"additional","affiliation":[]},{"given":"Zarina","family":"Shukur","sequence":"additional","affiliation":[]},{"given":"Faizan","family":"Qamar","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2024]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","DOI":"10.1117\/1.JEI.31.3.033021","article-title":"User data privacy in multimedia domain using 3-3 LSB-based color image steganography with RC4 and Bernoulli map protection","volume":"31","author":"Trivedi","year":"2022","journal-title":"J. Electron. Imaging"},{"key":"ref2","series-title":"2019 15th Int. Wirel. Commun. Mobile Comput. Conf. (IWCMC)","first-page":"1940","article-title":"A robust digital watermarking algorithm for text document copyright protection based on feature coding","author":"Iqbal","year":"Jun. 2019"},{"key":"ref3","series-title":"2020 SoutheastCon","article-title":"Secure data transfer through internet using cryptography and image steganography","volume":"2","author":"Nunna","year":"2020"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"110","DOI":"10.52711\/2321-581X.2021.00019","article-title":"A review on network security and cryptography","volume":"12","author":"Savant","year":"2021","journal-title":"Res. J. Eng. Technol."},{"key":"ref5","series-title":"2022 4th Int. Conf. Smart Syst. Inventive Technol. (ICSSIT)","first-page":"1369","article-title":"Image steganography using pixel value differencing with modulus function and optimization","author":"Akhila","year":"2022"},{"key":"ref6","first-page":"6909","article-title":"Securing matrix counting-based secret-sharing involving crypto steganography","volume":"34","author":"Al-Shaarani","year":"2022","journal-title":"J. King Saud Univ.\u2013Comput. Inf. Sci."},{"key":"ref7","series-title":"2020 Int. Conf. Comput. Perform. Eval. (ComPE)","first-page":"136","article-title":"Developing a highly secure and high Capacity LSB steganography technique using PRNG","author":"Deo","year":"2020"},{"key":"ref8","series-title":"2021 2nd Int. Conf. Secure Cyber Comput. Commun. (ICSCCC)","first-page":"302","article-title":"LSB steganography using pixel locator sequence with AES","author":"Tiwari","year":"2021"},{"key":"ref9","first-page":"24","article-title":"A LSB based image steganography using random pixel and bit selection for high payload","volume":"3","author":"Ali","year":"2021","journal-title":"Int. J. Math. Sci. Comput."},{"key":"ref10","first-page":"120","article-title":"Steganography: A flexible embedded randomization technique","volume":"17","author":"Abuhmaidan","year":"2023","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref11","doi-asserted-by":"crossref","DOI":"10.3390\/app112210928","article-title":"Data hiding and its applications: Digital watermarking and steganography","volume":"11","author":"Meg\u00edas","year":"2021","journal-title":"Appl. Sci."},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.3390\/e25040563","article-title":"A multi-directional pixel-swapping approach (MPSA) for entropy-retained reversible data hiding in encrypted images","volume":"25","author":"Panchikkil","year":"2023","journal-title":"Entropy"},{"key":"ref13","series-title":"2017 1st Int. Conf. Inform. Comput. Sci. (ICICoS)","first-page":"47","article-title":"An improved secure image hiding technique using PN-sequence based on DCT-OTP","author":"Najih","year":"2017"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"184","DOI":"10.58414\/SCIENTIFICTEMPER.2023.14.1.22","article-title":"Enhanced AES-256 cipher round algorithm for IoT applications","volume":"14","author":"Santhanalakshmi","year":"2023","journal-title":"Sci. Temper"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/j.comcom.2020.01.033","article-title":"Enhancement of e-commerce security through asymmetric key algorithm","volume":"153","author":"Dijesh","year":"2020","journal-title":"Comput. Commun."},{"key":"ref16","doi-asserted-by":"crossref","first-page":"133496","DOI":"10.1109\/ACCESS.2019.2941440","article-title":"An optimized steganography hiding capacity and imperceptibly using genetic algorithms","volume":"7","author":"Wazirali","year":"2019","journal-title":"IEEE Access"},{"key":"ref17","series-title":"2022 8th Int. Conf. Smart Struct. Syst. (ICSSS)","first-page":"1","article-title":"An innovative model for secure environment using steganography","author":"Maheswari","year":"2022"},{"key":"ref18","first-page":"511","article-title":"High-security image steganography technique using XNOR operation and fibonacci algorithm","volume":"11","author":"Almayyahi","year":"2020","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref19","doi-asserted-by":"crossref","first-page":"31487","DOI":"10.1007\/s11042-018-6213-0","article-title":"High capacity, transparent and secure audio steganography model based on fractal coding and chaotic map in temporal domain","volume":"77","author":"Ali","year":"2018","journal-title":"Multimed. Tool Appl."},{"key":"ref20","doi-asserted-by":"crossref","first-page":"55506","DOI":"10.1109\/ACCESS.2021.3059654","article-title":"A video steganography method based on transform block decision for H. 265\/HEVC","volume":"9","author":"Zhao","year":"2021","journal-title":"IEEE Access"},{"key":"ref21","first-page":"170","article-title":"New text steganography technique based on part-of-speech tagging and format-preserving encryption","volume":"18","author":"Majeed","year":"2024","journal-title":"KSII Trans. Internet Inf. Syst."},{"key":"ref22","doi-asserted-by":"crossref","first-page":"40529","DOI":"10.1007\/s11042-023-16699-7","article-title":"Developing a novel DNA-based steganography algorithm using random table generation with segmentation","volume":"83","author":"Alhabeeb","year":"Apr. 2024","journal-title":"Multimed. Tools Appl."},{"key":"ref23","series-title":"2018 Int. Conf. Inf. Commun. Technol. (ICOIACT)","first-page":"191","article-title":"Simple and secure image steganography using LSB and triple XOR operation on MSB","author":"Astuti","year":"2018"},{"key":"ref24","first-page":"139","article-title":"A secure image steganography using LSB and double XOR operations","volume":"20","author":"Ahmed","year":"2020","journal-title":"Int. J. Comput. Sci. Net."},{"key":"ref25","series-title":"2019 First Int. Conf. Intell. Comput. Eng. (ICOICE)","first-page":"1","article-title":"Image steganography based on LSB matching and image enlargement","author":"Al-Aidroos","year":"2019"},{"key":"ref26","first-page":"58","article-title":"Performance analysis of the last significant bit (LSB) method in steganography for data hiding in image data","author":"Baso","year":"2023","journal-title":"J. Secur., Comput., Inf., Embedded, Netw., Intell. Syst."},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/s42979-023-01949-0","article-title":"Adaptive image steganography using rotating color channels and inverted LSB substitution","volume":"4","author":"Bilgaiyan","year":"2023","journal-title":"SN Comput. Sci."},{"key":"ref28","doi-asserted-by":"crossref","first-page":"308","DOI":"10.3897\/jucs.105702","article-title":"A novel LSB steganography technique using image segmentation","volume":"30","author":"Demircan","year":"2024","journal-title":"J. Univers. Comput. Sci. (JUCS)"},{"key":"ref29","series-title":"AIP Conf. Proc.","doi-asserted-by":"crossref","DOI":"10.1063\/5.0172397","article-title":"A literature review on image quality and embedding payload for image steganography","volume":"2855, no. 1","author":"Patel","year":"Dec. 2023"},{"key":"ref30","first-page":"694","article-title":"Security and imperceptibility improving of image steganography using pixel allocation and random function techniques","volume":"12","author":"Abbas","year":"2022","journal-title":"Int. J. Electr. Comput. Eng."},{"key":"ref31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1155\/2018\/9475142","article-title":"A new method of image steganography using 7th bit of a pixel as indicator by introducing the successive temporary pixel in the grayscale image","volume":"2018","author":"Joshi","year":"2018","journal-title":"J. Comput. Netw. Commun."},{"key":"ref32","article-title":"A review on security techniques in image steganography","volume":"14","author":"Ghoul","year":"2023","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"ref33","doi-asserted-by":"crossref","first-page":"5253","DOI":"10.1007\/s10489-024-05415-z","article-title":"Beyond traditional steganography: Enhancing security and performance with spread spectrum image steganography","volume":"54","author":"Kuznetsov","year":"2024","journal-title":"Appl. Intell."},{"key":"ref34","doi-asserted-by":"crossref","first-page":"10835","DOI":"10.1007\/s11042-022-13689-z","article-title":"Efficient color image encryption by color-grayscale conversion based on steganography","volume":"82","author":"Yang","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref35","series-title":"2017 5th Iranian Joint Congress Fuzzy Intell. Syst. (CFIS)","first-page":"144","article-title":"High hiding capacity steganography method based on pixel indicator technique","author":"Rahmani","year":"2017"},{"key":"ref36","article-title":"An efficient and adaptive data-hiding scheme based on secure random matrix","volume":"14","author":"Zhang","year":"2019","journal-title":"PLoS One"},{"key":"ref37","series-title":"2020 Third Int. Conf. Adv. Electron., Comput. Commun. (ICAECC)","first-page":"1","article-title":"A secure steganography model using random-bit select algorithm","author":"Gahan","year":"2020"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.380","article-title":"Steganography in color images with random order of pixel selection and encrypted text message embedding","volume":"7","author":"Kordov","year":"2021","journal-title":"PeerJ Comput. Sci."},{"key":"ref39","first-page":"1","article-title":"A novel scheme for random sequential high-capacity data hiding based on PVD and LSB","author":"Wu","year":"2023","journal-title":"Signal, Image Video Process."},{"key":"ref40","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3991\/ijoe.v19i06.37587","article-title":"Secured transfer and storage image data for cloud communications","volume":"19","author":"Abdul-Hussein","year":"2023","journal-title":"Int. J. Online Biomed. Eng."},{"key":"ref41","doi-asserted-by":"crossref","first-page":"2187","DOI":"10.1007\/s40747-023-01258-2","article-title":"Reversibly selective encryption for medical images based on coupled chaotic maps and steganography","volume":"10","author":"Zhang","year":"2024","journal-title":"Complex Intell. Syst."},{"key":"ref42","doi-asserted-by":"crossref","DOI":"10.3390\/s20092739","article-title":"An efficient data-hiding scheme based on multidimensional Mini-SuDoKu","volume":"20","author":"Horng","year":"2020","journal-title":"Sensors"},{"key":"ref43","article-title":"A novel steganography scheme for color image based on HLS translation","volume":"2025","author":"Shao","year":"2021","journal-title":"J. Phys.: Conf. Ser."},{"key":"ref44","doi-asserted-by":"crossref","DOI":"10.1186\/s13640-020-00512-8","article-title":"A video coverless information hiding algorithm based on semantic segmentation","volume":"2020","author":"Pan","year":"2020","journal-title":"EURASIP J. Image Video Process."},{"key":"ref45","series-title":"2021 Third Int. Conf. Intell. Commun. Technol. Virtual Mobile Netw. (ICICV)","article-title":"An image hiding algorithm based on bit plane and two-dimensional code","author":"Jiang","year":"2021"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"6915","DOI":"10.1109\/ACCESS.2020.2964264","article-title":"Color image reversible data hiding with double-layer embedding","volume":"8","author":"Tang","year":"2020","journal-title":"IEEE Access"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s11042-021-11741-y","article-title":"A new high capacity and secure image realization steganography based on ASCII code matching","volume":"81","author":"Elshoush","year":"2022","journal-title":"Multimed. Tools Appl."},{"key":"ref48","series-title":"Proc. Int. Conf. Commun. Inf. Process. (ICCIP)","article-title":"Video steganography using edge detection techniques","author":"Deshmukh","year":"2019"},{"key":"ref49","doi-asserted-by":"crossref","DOI":"10.3390\/sym14030509","article-title":"Position-aware guided hiding data scheme with reversibility and adaptivity for dual images","volume":"14","author":"Chang","year":"2022","journal-title":"Symmetry"},{"key":"ref50","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/IS3C50286.2020.00015","article-title":"Chi-square detection for PVD steganography","author":"Pan","year":"2020","journal-title":"2020 Int. Symp. Comput., Consumer Control"},{"key":"ref51","unstructured":"B. Boehm, \u201cStegexpose-A tool for detecting LSB steganography,\u201d 2014, arXiv:1410.6656."},{"key":"ref52","unstructured":"J. Baxter, \u201cDataset text document classification,\u201d 2020. Accessed: Jun. 8, 2020. [Online]. Available: https:\/\/www.kaggle.com\/datasets\/sunilthite\/text-document-classification-dataset"},{"key":"ref53","article-title":"RGB-BMP steganalysis dataset","volume":"V1","author":"Al-Jarrah","year":"2018","journal-title":"Mendeley Data"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.techscience.com\/files\/cmc\/2024\/TSP_CMC-81-1\/TSP_CMC_50090\/TSP_CMC_50090.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,7]],"date-time":"2025-03-07T02:29:00Z","timestamp":1741314540000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v81n1\/58294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":53,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024]]},"published-print":{"date-parts":[[2024]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2024.050090","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"2024-01-27","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-09","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-10-15","order":2,"name":"published","label":"Published Online","group":{"name":"publication_history","label":"Publication History"}}]}}