{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T09:10:58Z","timestamp":1720257058765},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T00:00:00Z","timestamp":1525219200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100003443","name":"Ministry of Education and Science of the Russian Federation","doi-asserted-by":"publisher","award":["2.3583.2017\/4.6","2.3583.2017\/4.6","2.3583.2017\/4.6"],"id":[{"id":"10.13039\/501100003443","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1007\/s11042-018-6055-9","type":"journal-article","created":{"date-parts":[[2018,5,2]],"date-time":"2018-05-02T16:30:03Z","timestamp":1525278603000},"page":"28567-28599","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["The adaptive algorithm of information unmistakable embedding into digital images based on the discrete Fourier transformation"],"prefix":"10.1007","volume":"77","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8257-2082","authenticated-orcid":false,"given":"Oleg","family":"Evsutin","sequence":"first","affiliation":[]},{"given":"Anna","family":"Kokurina","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Meshcheryakov","sequence":"additional","affiliation":[]},{"given":"Olga","family":"Shumskaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,2]]},"reference":[{"issue":"C","key":"6055_CR1","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/j.eswa.2015.10.024","volume":"46","author":"H Al-Dmour","year":"2016","unstructured":"Al-Dmour H, Al-An A (2016) A steganography embedding method based on edge identification and XOR coding. Expert Syst Appl 46(C):293\u2013306. \n https:\/\/doi.org\/10.1016\/j.eswa.2015.10.024","journal-title":"Expert Syst Appl"},{"issue":"14","key":"6055_CR2","doi-asserted-by":"publisher","first-page":"17595","DOI":"10.1007\/s11042-017-4965-6","volume":"77","author":"Sambit Bakshi","year":"2017","unstructured":"Bakshi S, Sa PK, Wang H, Barpanda SS, Majhi B (2017) Fast periocular authentication in handheld devices with reduced phase intensive local pattern. Multimed Tools Appl. \n https:\/\/doi.org\/10.1007\/s11042-017-4965-6","journal-title":"Multimedia Tools and Applications"},{"issue":"5","key":"6055_CR3","doi-asserted-by":"publisher","first-page":"1163","DOI":"10.1007\/s11760-013-0555-x","volume":"9","author":"M Cedillo-Hernandez","year":"2015","unstructured":"Cedillo-Hernandez M, Garcia-Ugalde F, Nakano-Miyatake M, Perez-Meana H (2015) Robust watermarking method in DFT domain for effective management of medical imaging. SIViP 9(5):1163\u20131178. \n https:\/\/doi.org\/10.1007\/s11760-013-0555-x","journal-title":"SIViP"},{"issue":"1","key":"6055_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.amc.2007.05.063","volume":"196","author":"WY Chen","year":"2008","unstructured":"Chen WY (2008) Color image steganography scheme using DFT, SPIHT codec, and modified differential phase-shift keying techniques. Appl Math Comput 196(1):40\u201354. \n https:\/\/doi.org\/10.1016\/j.amc.2007.05.063","journal-title":"Appl Math Comput"},{"issue":"10","key":"6055_CR5","doi-asserted-by":"publisher","first-page":"5493","DOI":"10.1007\/s11042-015-2522-8","volume":"75","author":"ST Chen","year":"2016","unstructured":"Chen ST, Huang HN, Kung WM, Hsu CY (2016) Optimization-based image watermarking with integrated quantization embedding in the wavelet-domain. Multimed Tools Appl 75(10):5493\u20135511. \n https:\/\/doi.org\/10.1007\/s11042-015-2522-8","journal-title":"Multimed Tools Appl"},{"key":"6055_CR6","doi-asserted-by":"publisher","unstructured":"Chen Q, Zhang G, Yang X, Li S, Li Y, Wang HH (2017) Single image shadow detection and removal based on feature fusion and multiple dictionary learning. Multimed Tools Appl. \n https:\/\/doi.org\/10.1007\/s11042-017-5299-0","DOI":"10.1007\/s11042-017-5299-0"},{"key":"6055_CR7","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1007\/s11042-012-1315-6","volume":"71","author":"YH Choi","year":"2014","unstructured":"Choi YH, Kim D, Rho S, Hwang E (2014) Converting image to a gateway to an information portal for digital signage. Multimed Tools Appl 71:263\u2013278. \n https:\/\/doi.org\/10.1007\/s11042-012-1315-6","journal-title":"Multimed Tools Appl"},{"issue":"1","key":"6055_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/s10462-016-9459-9","volume":"46","author":"\u015e Do\u011fan","year":"2016","unstructured":"Do\u011fan \u015e (2016) A new data hiding method based on chaos embedded genetic algorithm for color image. Artif Intell Rev 46(1):129\u2013143. \n https:\/\/doi.org\/10.1007\/s10462-016-9459-9","journal-title":"Artif Intell Rev"},{"issue":"2","key":"6055_CR9","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s11042-013-1377-0","volume":"73","author":"N Ejaz","year":"2014","unstructured":"Ejaz N, Anwar J, Ishtiaq M, Baik SW (2014) Adaptive image data hiding using transformation and error replacement. Multimed Tools Appl 73(2):825\u2013840. \n https:\/\/doi.org\/10.1007\/s11042-013-1377-0","journal-title":"Multimed Tools Appl"},{"key":"6055_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33816-3_5","volume-title":"Proceedings of the First International Scientific Conference \u201cIntelligent Information Technologies for Industry\u201d (IITI\u201916). Advances in intelligent Systems and Computing","author":"O Evsutin","year":"2016","unstructured":"Evsutin O, Kokurina A, Mescheryakov R, Shumskaya O (2016) An adaptive algorithm for the Steganographic embedding information into the discrete Fourier transform phase Spectrum. In: Abraham A, Kovalev S, Tarassov V, Sn\u00e1\u0161el V (eds) Proceedings of the First International Scientific Conference \u201cIntelligent Information Technologies for Industry\u201d (IITI\u201916). Advances in intelligent Systems and Computing, vol 451. Springer, Cham. \n https:\/\/doi.org\/10.1007\/978-3-319-33816-3_5"},{"issue":"2","key":"6055_CR11","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s11042-010-0486-2","volume":"52","author":"M Fallahpour","year":"2011","unstructured":"Fallahpour M, Megias D, Ghanbari M (2011) Subjectively adapted high capacity lossless image data hiding based on prediction errors. Multimed Tools Appl 52(2):513\u2013527. \n https:\/\/doi.org\/10.1007\/s11042-010-0486-2","journal-title":"Multimed Tools Appl"},{"key":"6055_CR12","volume-title":"Steganography in digital media: principles, algorithms, and applications","author":"J Fridrich","year":"2010","unstructured":"Fridrich J (2010) Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, Cambridge"},{"key":"6055_CR13","volume-title":"Digital image processing","author":"RC Gonzalez","year":"2008","unstructured":"Gonzalez RC, Woods RE (2008) Digital image processing. Prentice Hall, Upper Saddle River"},{"key":"6055_CR14","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1117\/12.298461","volume":"3312","author":"M Holliman","year":"1998","unstructured":"Holliman M, Memon N, Yeo BL, Yeung M (1998) Adaptive public watermarking of DCT-based compressed images. Proc SPIE 3312:284\u2013295. \n https:\/\/doi.org\/10.1117\/12.298461","journal-title":"Proc SPIE"},{"issue":"4","key":"6055_CR15","doi-asserted-by":"publisher","first-page":"11811191","DOI":"10.1109\/TIFS.2012.2198213","volume":"7","author":"F Huang","year":"2012","unstructured":"Huang F, Huang J, Shi YQ (2012) New channel selection rule for JPEG steganography. IEEE T Inf Foren Sec 7(4):11811191\u201311811191. \n https:\/\/doi.org\/10.1109\/TIFS.2012.2198213","journal-title":"IEEE T Inf Foren Sec"},{"key":"6055_CR16","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1186\/1687-417X-2014-8","volume":"2014","author":"S Islam","year":"2014","unstructured":"Islam S, Modi MR, Gupta P (2014) Edge-based image steganography. EURASIP J Info Secur 2014:8. \n https:\/\/doi.org\/10.1186\/1687-417X-2014-8","journal-title":"EURASIP J Info Secur"},{"issue":"5","key":"6055_CR17","doi-asserted-by":"publisher","first-page":"1611","DOI":"10.1007\/s00034-013-9703-3","volume":"33","author":"C Jiang","year":"2014","unstructured":"Jiang C, Pang Y, Xiong S (2014) A high capacity steganographic method based on quantization table modification and F5 algorithm. Circuits Syst Signal Process 33(5):1611\u20131626. \n https:\/\/doi.org\/10.1007\/s00034-013-9703-3","journal-title":"Circuits Syst Signal Process"},{"issue":"2","key":"6055_CR18","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1016\/j.csi.2008.06.001","volume":"31","author":"KH Jung","year":"2009","unstructured":"Jung KH, Yoo KY (2009) Data hiding method using image interpolation. Comp Stand Inter 31(2):465\u2013470. \n https:\/\/doi.org\/10.1016\/j.csi.2008.06.001","journal-title":"Comp Stand Inter"},{"issue":"14","key":"6055_CR19","doi-asserted-by":"publisher","first-page":"6123","DOI":"10.1016\/j.eswa.2014.04.022","volume":"41","author":"HR Kanan","year":"2014","unstructured":"Kanan HR, Nazeri B (2014) A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm. Expert Syst Appl 41(14):6123\u20136130. \n https:\/\/doi.org\/10.1016\/j.eswa.2014.04.022","journal-title":"Expert Syst Appl"},{"issue":"8","key":"6055_CR20","doi-asserted-by":"publisher","first-page":"6712","DOI":"10.1016\/j.eswa.2011.12.019","volume":"39","author":"CF Lee","year":"2012","unstructured":"Lee CF, Huang YL (2012) An efficient image interpolation increasing payload in reversible data hiding. Expert Syst Appl 39(8):6712\u20136719. \n https:\/\/doi.org\/10.1016\/j.eswa.2011.12.019","journal-title":"Expert Syst Appl"},{"issue":"7","key":"6055_CR21","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s12243-013-0415-2","volume":"69","author":"F Li","year":"2014","unstructured":"Li F, Zhang X, Yu J, Shen W (2014) Adaptive JPEG steganography with new distortion function. Ann Telecommun 69(7):431\u2013440. \n https:\/\/doi.org\/10.1007\/s12243-013-0415-2","journal-title":"Ann Telecommun"},{"key":"6055_CR22","doi-asserted-by":"publisher","first-page":"5787","DOI":"10.1007\/s11042-014-2408-1","volume":"76","author":"S Liu","year":"2017","unstructured":"Liu S, Fu W, He L, Zhou J, Ma M (2017) Distribution of primary additional errors in fractal encoding method. Multimed Tools Appl 76:5787\u20135802. \n https:\/\/doi.org\/10.1007\/s11042-014-2408-1","journal-title":"Multimed Tools Appl"},{"issue":"4","key":"6055_CR23","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/s00500-008-0329-5","volume":"13","author":"SP Maity","year":"2009","unstructured":"Maity SP, Kundu MK (2009) Genetic algorithms for optimality of data hiding in digital images. Soft Comput 13(4):361\u2013373. \n https:\/\/doi.org\/10.1007\/s00500-008-0329-5","journal-title":"Soft Comput"},{"key":"6055_CR24","doi-asserted-by":"publisher","first-page":"8517","DOI":"10.1007\/s11042-016-3490-3","volume":"76","author":"Z Pakdaman","year":"2017","unstructured":"Pakdaman Z, Saryazdi S, Nezamabadi-pour H (2017) A prediction based reversible image watermarking in Hadamard domain. Multimed Tools Appl 76:8517\u20138545. \n https:\/\/doi.org\/10.1007\/s11042-016-3490-3","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"6055_CR25","doi-asserted-by":"publisher","first-page":"033008-1","DOI":"10.1117\/1.3609010","volume":"20","author":"A Poljicak","year":"2011","unstructured":"Poljicak A, Mandic L, Agic D (2011) Discrete Fourier transform-based watermarking method with an optimal implementation radius. J Electron Imaging 20(3):033008-1\u2013033008-8. \n https:\/\/doi.org\/10.1117\/1.3609010","journal-title":"J Electron Imaging"},{"key":"6055_CR26","doi-asserted-by":"publisher","first-page":"16657","DOI":"10.1007\/s11042-016-3942-9","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T (2017) Color-secure digital image compression. Multimed Tools Appl 76:16657\u201316679. \n https:\/\/doi.org\/10.1007\/s11042-016-3942-9","journal-title":"Multimed Tools Appl"},{"key":"6055_CR27","doi-asserted-by":"publisher","first-page":"6473","DOI":"10.1007\/s11042-016-3301-x","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) High-capacity steganography: a global-adaptive-region discrete cosine transform approach. Multimed Tools Appl 76:6473\u20136493. \n https:\/\/doi.org\/10.1007\/s11042-016-3301-x","journal-title":"Multimed Tools Appl"},{"key":"6055_CR28","doi-asserted-by":"publisher","first-page":"8627","DOI":"10.1007\/s11042-016-3501-4","volume":"76","author":"T Rabie","year":"2017","unstructured":"Rabie T, Kamel I (2017) Toward optimal embedding capacity for transform domain steganography: a quad-tree adaptive-region approach. Multimed Tools Appl 76:8627\u20138650. \n https:\/\/doi.org\/10.1007\/s11042-016-3501-4","journal-title":"Multimed Tools Appl"},{"issue":"3","key":"6055_CR29","doi-asserted-by":"publisher","first-page":"1617","DOI":"10.1007\/s11235-011-9655-5","volume":"52","author":"R Ridzon","year":"2013","unstructured":"Ridzon R, Levicky D (2013) Content protection in grayscale and color images based on robust digital watermarking. Telecommun Syst 52(3):1617\u20131631. \n https:\/\/doi.org\/10.1007\/s11235-011-9655-5","journal-title":"Telecommun Syst"},{"key":"6055_CR30","volume-title":"Data compression: the complete reference","author":"D Salomon","year":"2007","unstructured":"Salomon D (2007) Data compression: the complete reference, 4th edn. Springer\u2013Verlag, London","edition":"4"},{"key":"6055_CR31","unstructured":"SIPI Image Database. \n http:\/\/sipi.usc.edu\/database\/"},{"issue":"11","key":"6055_CR32","doi-asserted-by":"publisher","first-page":"1741","DOI":"10.1109\/83.967401","volume":"10","author":"V Solachidis","year":"2001","unstructured":"Solachidis V, Pitas I (2001) Circularly symmetric watermark embedding in 2-D DFT domain. IEEE T Image Process 10(11):1741\u20131753. \n https:\/\/doi.org\/10.1109\/83.967401","journal-title":"IEEE T Image Process"},{"issue":"18","key":"6055_CR33","doi-asserted-by":"publisher","first-page":"23529","DOI":"10.1007\/s11042-018-5682-5","volume":"77","author":"Jinjoo Song","year":"2018","unstructured":"Song J, Yoon G, Cho H, Yoon SM (2018) Structure preserving dimensionality reduction for visual object recognition. Multimed Tools Appl. \n https:\/\/doi.org\/10.1007\/s11042-018-5682-5","journal-title":"Multimedia Tools and Applications"},{"key":"6055_CR34","doi-asserted-by":"publisher","first-page":"23721","DOI":"10.1007\/s11042-016-4153-0","volume":"76","author":"J Wang","year":"2017","unstructured":"Wang J, Li T, Shi YQ, Lian S, Ye J (2017) Forensics feature analysis in quaternion wavelet domain for distinguishing photographic images and computer graphics. Multimed Tools Appl 76:23721\u201323737. \n https:\/\/doi.org\/10.1007\/s11042-016-4153-0","journal-title":"Multimed Tools Appl"},{"issue":"2","key":"6055_CR35","doi-asserted-by":"publisher","first-page":"126","DOI":"10.2478\/s11772-012-0020-3","volume":"20","author":"CY Weng","year":"2012","unstructured":"Weng CY, Tso HK, Wang SJ (2012) Steganographic data hiding in image processing using predictive differencing. Opto-Electron Rev 20(2):126\u2013133. \n https:\/\/doi.org\/10.2478\/s11772-012-0020-3","journal-title":"Opto-Electron Rev"},{"key":"6055_CR36","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-45496-9_21","volume-title":"Information Hiding","author":"Andreas Westfeld","year":"2001","unstructured":"Westfeld A (2001) F5\u2014A Steganographic Algorithm. In: Moskowitz IS (ed) Information hiding. IH 2001. Lecture Notes in Computer Science, vol 2137. Springer, Berlin, Heidelberg. \n https:\/\/doi.org\/10.1007\/3-540-45496-9_21"},{"key":"6055_CR37","doi-asserted-by":"publisher","unstructured":"Xie X, Livermore C (2016) A pivot-hinged, multilayer SU-8 micro motion amplifier assembled by a self-aligned approach. In: Proceedings of the 29th International Conference on Micro Electro Mechanical Systems (MEMS 2016). IEEE. \n https:\/\/doi.org\/10.1109\/MEMSYS.2016.7421561","DOI":"10.1109\/MEMSYS.2016.7421561"},{"key":"6055_CR38","doi-asserted-by":"publisher","unstructured":"Xie X, Livermore C (2017) Passively self-aligned assembly of compact barrel hinges for highperformance, out-of-plane mems actuators. In: Proceedings of the 30th International Conference on Micro Electro Mechanical Systems (MEMS 2017). IEEE. \n https:\/\/doi.org\/10.1109\/MEMSYS.2017.7863532","DOI":"10.1109\/MEMSYS.2017.7863532"},{"key":"6055_CR39","unstructured":"Xie X, Zaitsev Y, Vel\u00e1squez-Garc\u00eda LF, Teller S, Livermore C (2014) Compact, scalable, highresolution, MEMS-enabled tactile displays. In: Proceedings of the 16th Workshop on Solid-State Sensors, Actuators, and Microsystems. Hilton Head Island, South Califorina, pp 127\u2013130"},{"issue":"12","key":"6055_CR40","doi-asserted-by":"publisher","first-page":"125014","DOI":"10.1088\/0960-1317\/24\/12\/125014","volume":"24","author":"X Xie","year":"2014","unstructured":"Xie X, Zaitsev Y, Vel\u00e1squez-Garc\u00eda LF, Teller SJ, Livermore C (2014) Scalable, MEMS-enabled, vibrational tactile actuators for high resolution tactile displays. J Micromech Microeng 24(12):125014. \n https:\/\/doi.org\/10.1088\/0960-1317\/24\/12\/125014","journal-title":"J Micromech Microeng"},{"key":"6055_CR41","unstructured":"Zhao J, Koch E (1995) Embedding Robust labels into images for copyright protection. In: Brunnstein K, Sint PP (eds) Proceedings of the Conference on Intellectual Property Rights and New Technologies (KnowRight '95). R. Oldenbourg Verlag GmbH Munich, Hamburg"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6055-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6055-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6055-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T23:33:55Z","timestamp":1556753635000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6055-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,2]]},"references-count":41,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2018,11]]}},"alternative-id":["6055"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6055-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,5,2]]},"assertion":[{"value":"4 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}