{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T17:52:38Z","timestamp":1726422758410},"reference-count":105,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"publisher","award":["19-71-00106"],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3022779","type":"journal-article","created":{"date-parts":[[2020,9,8]],"date-time":"2020-09-08T19:46:32Z","timestamp":1599594392000},"page":"166589-166611","source":"Crossref","is-referenced-by-count":61,"title":["Digital Steganography and Watermarking for Digital Images: A Review of Current Research Directions"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-8257-2082","authenticated-orcid":false,"given":"Oleg","family":"Evsutin","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-6444-7774","authenticated-orcid":false,"given":"Anna","family":"Melman","sequence":"additional","affiliation":[]},{"given":"Roman","family":"Meshcheryakov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2019.02.069"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2017.04.004"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08497-x"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/IntelCIS.2015.7397238"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-014-0355-3"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3490-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/13682199.2017.1367129"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4727-5"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3501-4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2557-x"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3035-1"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2820603"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-7512-9"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.11591\/ijece.v8i2.pp1156-1168"},{"key":"ref22","first-page":"430","article-title":"Survey of bio-inspired computing for information hiding","volume":"6","author":"huang","year":"2015","journal-title":"J Inf Hiding Multimedia Signal Process"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941440"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6851-2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s11760-015-0758-4"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6975-4"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-018-2138-9"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.05.001"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895062"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08193-w"},{"key":"ref51","first-page":"1","article-title":"Reversible image steganography using dual-layer LSB matching","volume":"21","author":"sahu","year":"2019","journal-title":"Image sensors"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2940972"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2803303"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2986134"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-014-1958-6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2961764"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2964830"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08109-8"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2018.02.002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.aci.2018.06.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2018.06.075"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.03.012"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2918086"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.04.005"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-020-08881-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2017.11.003"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/93.959097"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2983175"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2018.03.023"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1117\/12.435400"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6055-9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2017.0965"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2019.113157"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-5913-9"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-017-0497-5"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.03.013"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968577"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.06.034"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPEIC.2014.6915411"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/iThings\/GreenCom\/CPSCom\/SmartData.2019.00065"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICIEV.2013.6572548"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2012.04.004"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-07986-3"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2016.05.021"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-017-1345-y"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/s11554-018-0813-9"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3535-7"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2017.08.077"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115632"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2972736"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2018.2799381"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.03.016"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.07.021"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2570812"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.07.020"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139192903"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3018-2"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ISCIT.2010.5664886"},{"key":"ref93","first-page":"142","article-title":"Adaptive edge masking based on TV decomposition and adjacent similarity for digital watermarking","author":"guo","year":"2015","journal-title":"Proc IEEE Int Conf Prog Informat Comput (PIC)"},{"key":"ref92","first-page":"170","article-title":"Digital image watermarking based on texture block and edge detection in the discrete wavelet domain","author":"wang","year":"2013","journal-title":"Proc Int Conf Sensor Netw Secur Technol Privacy Commun Syst"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.01.006"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4280-5_6"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1016\/j.cogsys.2019.11.002"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-3200-6"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6126-y"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3449-4"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1007\/s40815-017-0420-0"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2017.07.043"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7123-x"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1016\/j.dt.2018.08.003"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/10719724_5"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-016-2459-5"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2555281"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6155-6"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2016.1206640"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60435-0_17"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-016-1874-9"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2014.10.006"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-019-08283-9"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.03.011"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2018.2852702"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.bspc.2019.101695"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2019.107287"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/j.aeue.2017.06.001"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2019.115725"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.23919\/IConAC.2018.8748967"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2921894"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831599"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-015-2786-z"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-7084-0"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09187785.pdf?arnumber=9187785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:55:48Z","timestamp":1639770948000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9187785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":105,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3022779","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}