{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:29:42Z","timestamp":1762507782691,"version":"3.41.2"},"reference-count":53,"publisher":"Wiley","issue":"3","license":[{"start":{"date-parts":[[2019,7,8]],"date-time":"2019-07-08T00:00:00Z","timestamp":1562544000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61671018","61860206004"],"award-info":[{"award-number":["61671018","61860206004"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Trans Emerging Tel Tech"],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In this paper, we proposed a novel generalized pixel value ordering\u2013based reversible data hiding using firefly algorithm (GPVOFA). The sequence of minimum and maximum number pixels value has been used to embed the secret data while prediction and modification are held on minimum, and the maximum number of pixel blocks is used to embed the secret data into multiple bits. The host image is divided into the size of noncoinciding dynamic blocks on the basis of firefly quadtree partition, whereas rough blocks are divided into a larger size; moreover, providing more embedding capacity used small flat blocks size and optimal location in the block to write the information. Our proposed method becomes able to embed large data into a host image with low distortion. The rich experimental results are better, as compared with related preceding arts.<\/jats:p>","DOI":"10.1002\/ett.3680","type":"journal-article","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T03:34:41Z","timestamp":1562643281000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Generalized PVO\u2010based dynamic block reversible data hiding for secure transmission using firefly algorithm"],"prefix":"10.1002","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9092-1708","authenticated-orcid":false,"given":"Rashid","family":"Abbasi","sequence":"first","affiliation":[{"name":"School of Computer and Technology Anhui University  Hefei China"}]},{"given":"Nawab Muhammad","family":"Faseeh Qureshi","sequence":"additional","affiliation":[{"name":"Department of Computer Education, Sungkyunkwan University  Seoul South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8158-2502","authenticated-orcid":false,"given":"Haseeb","family":"Hassan","sequence":"additional","affiliation":[{"name":"School of Computer and Technology Anhui University  Hefei China"}]},{"given":"Tanzila","family":"Saba","sequence":"additional","affiliation":[{"name":"College of Computer and Information Sciences Prince Sultan University  Riyadh Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3817-2655","authenticated-orcid":false,"given":"Amjad","family":"Rehman","sequence":"additional","affiliation":[{"name":"College of Computer and Information Systems Al Yamamah University  Riyadh Saudi Arabia"}]},{"given":"Bin","family":"Luo","sequence":"additional","affiliation":[{"name":"School of Computer and Technology Anhui University  Hefei China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2601-9327","authenticated-orcid":false,"given":"Ali Kashif","family":"Bashir","sequence":"additional","affiliation":[{"name":"Department of Computing and Mathematics Manchester Metropolitan University  Manchester UK"}]}],"member":"311","published-online":{"date-parts":[[2019,7,8]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.07.014"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/ett.3611"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2263-3"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2504464"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.840686"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2004.828418"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2010.2046930"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11045-017-0497-5"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2005.859373"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2011.09.028"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2006.891046"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.05.051"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2008.2009252"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2011.2150233"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-4230-4"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2018.11.005"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.JEI.28.1.013013"},{"issue":"4","key":"e_1_2_8_19_1","first-page":"718","article-title":"A reversible data hiding scheme based on histogram modification in integer DWT domain for BTC compressed images","volume":"18","author":"Zhang S","year":"2016","journal-title":"Int J Netw Secur"},{"key":"e_1_2_8_20_1","first-page":"169","volume-title":"Digital Forensics and Watermarking: 17th International Workshop, IWDW 2018, Jeju Island, Korea, October 22\u201024, 2018, Proceedings","author":"Ou B","year":"2018"},{"key":"e_1_2_8_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2017.10.001"},{"issue":"4","key":"e_1_2_8_22_1","first-page":"801","article-title":"A novel dual image\u2010based high payload reversible hiding technique using LSB matching","volume":"20","author":"Wang Y\u2010L","year":"2018","journal-title":"Int J Netw Secur"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2012.07.025"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dsp.2013.11.002"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2014.05.003"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.01.002"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2016.09.016"},{"issue":"1","key":"e_1_2_8_29_1","first-page":"65","article-title":"Generalized PVO\u2010K embedding technique for reversible data hiding","volume":"20","author":"Li J\u2010J","year":"2018","journal-title":"Int J Netw Secur"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13640-019-0458-z"},{"key":"e_1_2_8_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2015.03.022"},{"key":"e_1_2_8_32_1","first-page":"1","article-title":"Overlapping pixel value ordering predictor for high\u2010capacity reversible data hiding","author":"Lee C\u2010F","year":"2019","journal-title":"J Real Time Image Process"},{"key":"e_1_2_8_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2035975"},{"key":"e_1_2_8_34_1","first-page":"1","article-title":"A new multilevel reversible bit\u2010planes data hiding technique based on histogram shifting of efficient compressed domain","author":"Abbasi R","year":"2018","journal-title":"Vietnam J Comput Sci"},{"key":"e_1_2_8_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2803301"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.image.2017.07.001"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2009.2020257"},{"key":"e_1_2_8_38_1","doi-asserted-by":"publisher","DOI":"10.1155\/2010\/104835"},{"key":"e_1_2_8_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3501-4"},{"key":"e_1_2_8_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4727-5"},{"key":"e_1_2_8_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2573308"},{"volume-title":"Nature\u2010Inspired Metaheuristic Algorithms","year":"2010","author":"Yang X\u2010S","key":"e_1_2_8_42_1"},{"key":"e_1_2_8_43_1","first-page":"1","article-title":"High\u2010fidelity reversible data hiding by Quadtree\u2010based pixel value ordering","volume":"78","author":"Di F","year":"2018","journal-title":"Multimed Tools Appl"},{"key":"e_1_2_8_44_1","unstructured":"KimJH KimHY JeongSY.Method for encoding\/decoding block information using quad tree and device for using same. US patent 16 134 131.January 31 2019."},{"key":"e_1_2_8_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.01.034"},{"key":"e_1_2_8_46_1","doi-asserted-by":"publisher","DOI":"10.7763\/IJMLC.2011.V1.67"},{"key":"e_1_2_8_47_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-2479-5.ch007"},{"issue":"10","key":"e_1_2_8_48_1","first-page":"50","article-title":"Comparative study of firefly algorithm and particle swarm optimization for noisy non\u2010linear optimization problems","volume":"4","author":"Pal SK","year":"2012","journal-title":"Int J Intell Syst Appl"},{"key":"e_1_2_8_49_1","doi-asserted-by":"crossref","unstructured":"AmsaveniA ArunkumarC.An efficient data hiding scheme using firefly algorithm in spatial domain. In: Proceedings of the 2015 2nd International Conference on Electronics and Communication Systems (ICECS);2015;Coimbatore India.","DOI":"10.1109\/ECS.2015.7124988"},{"key":"e_1_2_8_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2016.11.003"},{"key":"e_1_2_8_51_1","doi-asserted-by":"publisher","DOI":"10.1155\/2019\/8981240"},{"key":"e_1_2_8_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-018-6203-2"},{"key":"e_1_2_8_53_1","first-page":"1","article-title":"The USC\u2010SIPI image database version 5","volume":"315","author":"Weber AG","year":"1997","journal-title":"USC SIPI Rep"},{"key":"e_1_2_8_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.015"}],"container-title":["Transactions on Emerging Telecommunications Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.3680","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/ett.3680","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/ett.3680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,25]],"date-time":"2023-08-25T23:17:24Z","timestamp":1693005444000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/ett.3680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,8]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10.1002\/ett.3680"],"URL":"https:\/\/doi.org\/10.1002\/ett.3680","archive":["Portico"],"relation":{},"ISSN":["2161-3915","2161-3915"],"issn-type":[{"type":"print","value":"2161-3915"},{"type":"electronic","value":"2161-3915"}],"subject":[],"published":{"date-parts":[[2019,7,8]]},"assertion":[{"value":"2019-04-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-06-03","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e3680"}}