{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,7]],"date-time":"2026-04-07T06:47:00Z","timestamp":1775544420528,"version":"3.50.1"},"reference-count":35,"publisher":"Tech Science Press","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["CMC"],"published-print":{"date-parts":[[2025]]},"DOI":"10.32604\/cmc.2025.061659","type":"journal-article","created":{"date-parts":[[2025,6,9]],"date-time":"2025-06-09T02:05:48Z","timestamp":1749434748000},"page":"1681-1710","source":"Crossref","is-referenced-by-count":3,"title":["Edge-Based Data Hiding and Extraction Algorithm to Increase Payload Capacity and Data Security"],"prefix":"10.32604","volume":"84","author":[{"given":"Hanan","family":"Hardan","sequence":"first","affiliation":[]},{"given":"Osama A.","family":"Khashan","sequence":"additional","affiliation":[]},{"given":"Mohammad","family":"Alshinwan","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2025]]},"reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"124891","DOI":"10.1016\/j.eswa.2024.124891","article-title":"Image privacy protection scheme based on high-quality reconstruction DCT compression and nonlinear dynamics","volume":"257","author":"Lin","year":"2024","journal-title":"Expert Syst Appl"},{"key":"ref2","first-page":"13","article-title":"A survey on cryptography and Steganography methods for information security","volume":"12","author":"Babu","year":"2010","journal-title":"Int J Comput Appl"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"536","DOI":"10.14419\/ijet.v7i4.15.28363","article-title":"Information hiding based on audio steganography using least significant bit","volume":"7","author":"Mohamad","year":"2018","journal-title":"Int J Eng Technol"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1016\/j.compeleceng.2017.08.020","article-title":"Medical jpeg image steganography based on preserving inter-block dependencies","volume":"67","author":"Liao","year":"2018","journal-title":"Comput Elect Eng"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"17589","DOI":"10.1007\/s11042-018-7123-x","article-title":"Fuzzy edge detection based steganography using modified gaussian distribution","volume":"78","author":"Dhargupta","year":"2019","journal-title":"Multimed Tools Appl"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"1550147720911006","DOI":"10.1177\/1550147720911006","article-title":"Reversible data hiding scheme based on pixel-value dif-ferencing in dual images","volume":"16","author":"Kim","year":"2020","journal-title":"Int J Distrib Sens Netw"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1550147720917826","DOI":"10.1177\/1550147720917826","article-title":"Color image steganalysis based on embedding change probabilities in differential channels","volume":"16","author":"Yang","year":"2020","journal-title":"Int J Distrib Sens Netw"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"12627","DOI":"10.1007\/s10586-024-04484-6","article-title":"Android malware detection using time-aware machine learning approach","volume":"27","author":"AlSobeh","year":"2024","journal-title":"Cluster Comput"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"1433","DOI":"10.32604\/cmc.2024.056742","article-title":"Constructive robust steganography algorithm based on style transfer","volume":"81","author":"Zhang","year":"2024","journal-title":"Comput, Mater Continua"},{"key":"ref10","first-page":"1311","article-title":"Enhanced steganalysis for color images using curvelet features and support vector machine","volume":"78","author":"Akram","year":"2024","journal-title":"Comput Mater Contin"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.17485\/ijst\/2016\/v9i21\/95207","article-title":"Performance analysis of edge detection algorithms on various image types","volume":"9","author":"Nagasankar","year":"2016","journal-title":"Indian J Sci Technol"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"2995","DOI":"10.1007\/s13369-018-3372-2","article-title":"Very high capacity image steganography technique using quotient value differencing and LSB substitution","volume":"44","author":"Swain","year":"2019","journal-title":"Arab J Sci Eng"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.cose.2015.06.012","article-title":"New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization","volume":"55","author":"El-Emam","year":"2015","journal-title":"Comput Secur"},{"key":"ref14","first-page":"238","article-title":"A comparative study and literature review of image steganography techniques","volume":"1","author":"Latika","year":"2015","journal-title":"Int J Sci Technol Eng"},{"key":"ref15","first-page":"102434","article-title":"Steganography over redundant residue number system codes","volume":"51","author":"Belhamra","year":"2020","journal-title":"J Inf Secur Appl"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"16","DOI":"10.5755\/j01.itc.46.1.15253","article-title":"A new steganographic algorithm based on multidirectional PVD and modified LSB","volume":"46","author":"Darabkh","year":"2017","journal-title":"Inf Technol Control"},{"key":"ref17","series-title":"2018 26th Signal Processing and Communications Applications Conference (SIU)","first-page":"1","article-title":"Data hiding using shuffle algorithm and lsb method","author":"Akbay","year":"2018"},{"key":"ref18","series-title":"Recent Advances in Intelligent Information Hiding and Multimedia Signal Processing: Proceeding of the Fourteenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing","first-page":"26","article-title":"A high payload edge detection-based image steganography robust to rs-attack by using lsb substitution and pixel value differencing","author":"Lee","year":"2018 Nov 26\u201328"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"3292","DOI":"10.1016\/j.eswa.2009.09.050","article-title":"High payload steganography mechanism using hybrid edge detector","volume":"37","author":"Chen","year":"2010","journal-title":"Expert Syst Appl"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"108","DOI":"10.3390\/fi15030108","article-title":"A novel hybrid edge detection and LBP code-based robust image steganography method","volume":"15","author":"Sultana","year":"2023","journal-title":"Future Internet"},{"key":"ref21","series-title":"2021 24th International Conference on Computer and Information Technology (ICCIT)","first-page":"1","article-title":"Image steganography system based on hybrid edge detector","author":"Sultana","year":"2021"},{"key":"ref22","series-title":"International Conference on Advances in Computing Research","first-page":"533","article-title":"Integrating data-driven security, model checking, and self-adaptation for IoT systems using bip components: a conceptual proposal model","author":"Alsobeh","year":"2023 May 8\u201310"},{"key":"ref23","series-title":"2023 11th International Symposium on Digital Forensics and Security (ISDFS)","first-page":"1","article-title":"Fuzzy logic-based steganographic scheme for high payload capacity with high imperceptibility","author":"Th\u00e9ophile","year":"2021"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/j.ins.2021.06.017","article-title":"Privacy-preserving multikey computing framework for encrypted data in the cloud","volume":"575","author":"Zhang","year":"2021","journal-title":"Inf Sci"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"40875","DOI":"10.1109\/JIOT.2024.3457017","article-title":"Secure and traceable multikey image retrieval in cloud-assisted internet of things","volume":"11","author":"Yang","year":"2024","journal-title":"IEEE Internet Things J"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"6001","DOI":"10.1109\/JIOT.2024.3489957","article-title":"Efficient and secure content-based image retrieval in cloud-assisted internet of things","volume":"12","author":"Chen","year":"2025","journal-title":"IEEE Internet Things J"},{"key":"ref27","first-page":"509","article-title":"Modified multi-level steganography to enhance data security","volume":"10","author":"Elshare","year":"2018","journal-title":"Int J Commun Netw Inform Secur"},{"key":"ref28","doi-asserted-by":"crossref","first-page":"e1115","DOI":"10.7717\/peerj-cs.1115","article-title":"New deep data hiding and extraction algorithm using multi-channel with multi-level to improve data security and payload capacity","volume":"8","author":"Hardan","year":"2022","journal-title":"PeerJ Comput Sci"},{"key":"ref29","unstructured":"Mohammad Imtiaz. Standard test images for image processing [Internet]; 2019. [cited 2025 Mar 17]. Available from: https:\/\/github.com\/mohammadimtiazz\/standard-test-images-for-Image-Processing"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"269","DOI":"10.1016\/j.isatra.2020.08.019","article-title":"A novel image scaling based reversible watermarking scheme for secure medical image transmission","volume":"108","author":"Malayil","year":"2021","journal-title":"ISA Trans"},{"key":"ref31","doi-asserted-by":"crossref","first-page":"107561","DOI":"10.1016\/j.knosys.2021.107561","article-title":"Real-time steganalysis for streaming media based on multi-channel convolutional sliding windows","volume":"237","author":"Yang","year":"2022","journal-title":"Knowl Based Syst"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"8525","DOI":"10.1007\/s13369-021-05554-2","article-title":"Chi-square-based steganalysis method against modified pixel-value differencing steganography","volume":"46","author":"Lin","year":"2021","journal-title":"Arab J Sci Eng"},{"key":"ref33","doi-asserted-by":"crossref","first-page":"013018","DOI":"10.1117\/1.JEI.30.1.013018","article-title":"MDRSteg: large-capacity image steganography based on multi-scale dilated ResNet and combined chi-square distance loss","volume":"30","author":"Mo","year":"2021","journal-title":"J Electron Imaging"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"1344","DOI":"10.3390\/e24101344","article-title":"A lightweight image encryption algorithm based on chaotic map and random substitution","volume":"24","author":"Alghamdi","year":"2022","journal-title":"Entropy"},{"key":"ref35","series-title":"Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2019","first-page":"897","article-title":"Data hiding with digital authentication in spatial domain image steganography","author":"Chatterjee","year":"2020"}],"container-title":["Computers, Materials &amp; Continua"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/cdn.techscience.cn\/files\/cmc\/2025\/TSP_CMC-84-1\/TSP_CMC_61659\/TSP_CMC_61659.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T01:34:52Z","timestamp":1763343292000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.techscience.com\/cmc\/v84n1\/61711"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":35,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2025]]},"published-print":{"date-parts":[[2025]]}},"URL":"https:\/\/doi.org\/10.32604\/cmc.2025.061659","relation":{},"ISSN":["1546-2226"],"issn-type":[{"value":"1546-2226","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}