{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:45:58Z","timestamp":1763451958879,"version":"3.45.0"},"reference-count":36,"publisher":"Wiley","issue":"6","license":[{"start":{"date-parts":[[2025,11,17]],"date-time":"2025-11-17T00:00:00Z","timestamp":1763337600000},"content-version":"vor","delay-in-days":16,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Security and Privacy"],"published-print":{"date-parts":[[2025,11]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Reversible data hiding in encrypted images (RDHEI) has attracted considerable attention for its ability to support secure communication and storage, yet existing multi\u2010key encryption\u2010based schemes often suffer from reconstruction inaccuracies under small\u2010block settings and high embedding rates. Motivated by this limitation, this study aims to achieve highly accurate and fully reversible image recovery even under small\u2010block and high\u2010embedding conditions. To address this limitation, we propose an enhanced RDHEI scheme that combines horizontal image duplication with a smoothness\u2010driven block selection mechanism. The dual\u2010reference structure effectively enlarges contextual information for pixel correlation, while smoothness\u2010guided recovery ensures more reliable reconstruction, even in complex textured regions. Extensive experiments on benchmark grayscale images demonstrate that, for a  block with 10 embedded bits, the restoration error rate on Lena is reduced from 0.76% to 0.01%, yielding near\u2010perfect reversibility, infinite PSNR, and SSIM values consistently above 0.98. Compared with conventional approaches, the proposed scheme delivers superior accuracy, robustness, and visual fidelity. These results highlight the method's potential for secure image communication and encrypted image storage, and provide a foundation for future work exploring extensions to multi\u2010channel (RGB) images, larger datasets, or video sequences.<\/jats:p>","DOI":"10.1002\/spy2.70145","type":"journal-article","created":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T03:51:57Z","timestamp":1763437917000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Robust Multi\u2010Key Reversible Data Hiding Scheme Leveraging Image Duplication and Smoothness Estimation"],"prefix":"10.1002","volume":"8","author":[{"given":"Zhaohui","family":"Li","sequence":"first","affiliation":[{"name":"Tianjin Key Laboratory of Network and Data Security Technology  Tianjin China"},{"name":"College of Cryptology and Cyber Science Nankai University  Tianjin China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-1886-9251","authenticated-orcid":false,"given":"Tiancheng","family":"Li","sequence":"additional","affiliation":[{"name":"College of Cryptology and Cyber Science Nankai University  Tianjin China"}]}],"member":"311","published-online":{"date-parts":[[2025,11,17]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2013.2246179"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2015.12.012"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2003.815962"},{"key":"e_1_2_8_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/tmm.2008.2007341"},{"key":"e_1_2_8_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/tip.2014.2307482"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1155\/s1110865702000537"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2013.2257814"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.11.040"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3019490"},{"key":"e_1_2_8_12_1","unstructured":"Y.Wu W.Ma Y.Peng R.Zhang andZ.Yin \u201cReversible Data Hiding in Encrypted Images Based on Bit\u2010Plane Compression of Prediction Error \u201d arXiv preprint arXiv:2007.04057 (2021)."},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2011.2114651"},{"key":"e_1_2_8_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2012.2187334"},{"key":"e_1_2_8_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvcir.2014.04.003"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010018\u20106187\u2010y"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598\u2010025\u201095433\u20109"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/8847559"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1049\/ipr2.12050"},{"key":"e_1_2_8_20_1","unstructured":"Y.Wu W.Ma Y.Peng R.Zhang andZ.Yin \u201cReversible Data Hiding in Encrypted Images Based on Bit\u2010Plane Compression of Prediction Error \u201d arXiv preprint arXiv:2007.04057 (2020)."},{"key":"e_1_2_8_21_1","first-page":"358","volume-title":"Proceedings of the Proceedings of the 11th International Conference on Digital Forensics and Watermaking, Berlin, Heidelberg, 2012; IWDW'12","author":"Zhang X.","year":"2013"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/e27020159"},{"key":"e_1_2_8_23_1","first-page":"1","volume-title":"Proceedings of the 2022 4th International Conference on Advances in Computing, Communication Control and Networking (ICAC3N)","author":"Nalavade J.","year":"2022"},{"key":"e_1_2_8_24_1","doi-asserted-by":"publisher","DOI":"10.3390\/e24070878"},{"key":"e_1_2_8_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2024.109664"},{"key":"e_1_2_8_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ibmed.2025.100280"},{"key":"e_1_2_8_27_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598\u2010024\u201055639\u20109"},{"key":"e_1_2_8_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2025.3545868"},{"key":"e_1_2_8_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2025.3540097"},{"key":"e_1_2_8_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijleo.2015.12.055"},{"key":"e_1_2_8_31_1","first-page":"403","volume-title":"Proceedings of the Information Systems Design and Intelligent Applications","author":"Giri D.","year":"2016"},{"key":"e_1_2_8_32_1","first-page":"6","article-title":"Dual Image Based Reversible Data Hiding Scheme Using Weighted Matrix","volume":"5","author":"Jana B.","year":"2016","journal-title":"International Journal of Electronics and Information Engineering"},{"key":"e_1_2_8_33_1","first-page":"239","volume-title":"Proceedings of the Computational Intelligence in Data Mining\u2014Volume 2","author":"Jana B.","year":"2016"},{"key":"e_1_2_8_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2003.819861"},{"key":"e_1_2_8_35_1","first-page":"2366","volume-title":"Proceedings of the Proceedings of the 20th International Conference on Pattern Recognition (ICPR)","author":"Hor\u00e9 A.","year":"2010"},{"key":"e_1_2_8_36_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym15010189"},{"key":"e_1_2_8_37_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598\u2010025\u201096152\u2010x"}],"container-title":["SECURITY AND PRIVACY"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/spy2.70145","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T07:42:36Z","timestamp":1763451756000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/spy2.70145"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,11]]}},"alternative-id":["10.1002\/spy2.70145"],"URL":"https:\/\/doi.org\/10.1002\/spy2.70145","archive":["Portico"],"relation":{},"ISSN":["2475-6725","2475-6725"],"issn-type":[{"type":"print","value":"2475-6725"},{"type":"electronic","value":"2475-6725"}],"subject":[],"published":{"date-parts":[[2025,11]]},"assertion":[{"value":"2025-07-26","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-04","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-11-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70145"}}