{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T12:11:14Z","timestamp":1775218274119,"version":"3.50.1"},"reference-count":46,"publisher":"Institution of Engineering and Technology (IET)","issue":"1","license":[{"start":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T00:00:00Z","timestamp":1758585600000},"content-version":"vor","delay-in-days":265,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":["ietresearch.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["IET Image Processing"],"published-print":{"date-parts":[[2025,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>In the realm of secure data communication, reversible data hiding (RDH) has emerged as a promising strategy to ensure both confidentiality and integrity. However, in resource\u2010constrained environments, such as microcontroller platforms, conventional RDH techniques encounter challenges due to factors like minimal memory resources and speed, which restrict the use of microcontrollers for implementing image RDH. Addressing this gap, we introduce a lightweight RDH system tailored for microcontrollers, employing the integer reversible Meixner transform (IRMMT), a variant of the Meixner moment transform optimised for integer operations. Unlike its floating\u2010point version, IRMMT ensures complete preservation of data, even with the use of low finite precision arithmetic, thereby demonstrating its efficacy for lossless applications and its suitability for resource\u2010limited embedded devices. Leveraging IRMMT, we propose a novel RDH algorithm designed to operate efficiently within the limitations of microcontroller resources while preserving image quality and integrity. The algorithm is implemented and evaluated on the Arduino Due board, which features the AT91SAM3X8E 32\u2010bit ARM Cortex\u2010M3 microcontroller, demonstrating the feasibility and effectiveness of the proposed approach in enabling secure wireless data communication. Through theoretical formulation, algorithm design and embedded implementation, this paper contributes to advancing RDH methodologies for resource\u2010limited embedded devices.<\/jats:p>","DOI":"10.1049\/ipr2.70218","type":"journal-article","created":{"date-parts":[[2025,9,23]],"date-time":"2025-09-23T14:54:44Z","timestamp":1758639284000},"update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Lightweight Reversible Data Hiding System for Microcontrollers Using Integer Reversible Meixner Transform"],"prefix":"10.1049","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9436-8361","authenticated-orcid":false,"given":"Mohamed","family":"Yamni","sequence":"first","affiliation":[{"name":"Engineering Sciences Laboratory Polydisciplinary Faculty Sidi Mohamed Ben Abdellah University  Taza Morocco"},{"name":"Industrial Systems Engineering and Energy Conversion (ISEEC) Faculty of Science and Technology Abdelmalek Essaadi University  Tangier Morocco"}]},{"given":"Achraf","family":"Daoui","sequence":"additional","affiliation":[{"name":"Engineering Sciences Laboratory Polydisciplinary Faculty Sidi Mohamed Ben Abdellah University  Taza Morocco"}]},{"given":"Chakir","family":"El\u2010Kasri","sequence":"additional","affiliation":[{"name":"Engineering Sciences Laboratory Polydisciplinary Faculty Sidi Mohamed Ben Abdellah University  Taza Morocco"}]},{"given":"May","family":"Almousa","sequence":"additional","affiliation":[{"name":"Department of Information Technology College of Computer and Information Sciences Princess Nourah bint Abdulrahman University  Riyadh Saudi Arabia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8225-4180","authenticated-orcid":false,"given":"Ali Abdullah S.","family":"AlQahtani","sequence":"additional","affiliation":[{"name":"Software Engineering Department Prince Sultan University  Riyadh Saudi Arabia"}]},{"given":"Ahmed A.","family":"Abd El\u2010Latif","sequence":"additional","affiliation":[{"name":"EIAS Data Science Lab College of Computer and Information Sciences, and Center of Excellence in Quantum and Intelligent Computing Prince Sultan University Riyadh Saudi Arabia"},{"name":"Department of Mathematics and Computer Science Faculty of Science Menoufia University  Shebin El\u2010Koom Egypt"}]}],"member":"265","published-online":{"date-parts":[[2025,9,23]]},"reference":[{"key":"e_1_2_12_2_1","doi-asserted-by":"publisher","DOI":"10.51594\/csitrj.v5i3.909"},{"key":"e_1_2_12_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010017\u20105156\u20101"},{"key":"e_1_2_12_4_1","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-45619-w"},{"key":"e_1_2_12_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3408136"},{"key":"e_1_2_12_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2023.03.008"},{"key":"e_1_2_12_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-021-11432-8"},{"key":"e_1_2_12_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.matcom.2024.01.023"},{"key":"e_1_2_12_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/app112210928"},{"key":"e_1_2_12_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010017\u20104960\u2010y"},{"key":"e_1_2_12_11_1","doi-asserted-by":"publisher","DOI":"10.3390\/electronics12051222"},{"key":"e_1_2_12_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23187914"},{"key":"e_1_2_12_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2021.3090673"},{"key":"e_1_2_12_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2018.06.001"},{"key":"e_1_2_12_15_1","doi-asserted-by":"crossref","unstructured":"C.\u2010C.LinandX.\u2010L.Liu \u201cA Reversible Data Hiding Scheme for Block Truncation Compressions Based on Histogram Modification \u201d in2012 Sixth International Conference on Genetic and Evolutionary Computing(IEEE 2012) 157\u2013160.","DOI":"10.1109\/ICGEC.2012.29"},{"key":"e_1_2_12_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2006.869964"},{"key":"e_1_2_12_17_1","doi-asserted-by":"crossref","unstructured":"W.\u2010C.Kuo D.\u2010J.Jiang andY.\u2010C.Huang \u201cA Reversible Data Hiding Scheme Based on Block Division \u201d in2008 Congress on Image and Signal Processing(IEEE 2008) 365\u2013369.","DOI":"10.1109\/CISP.2008.730"},{"key":"e_1_2_12_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74205-0_119"},{"key":"e_1_2_12_19_1","doi-asserted-by":"crossref","unstructured":"H.\u2010Y.HuangandS.\u2010H.Chang \u201cA 9\/7 Wavelet\u2010Based Lossless Data Hiding \u201d in2011 IEEE Symposium On Computational Intelligence For Multimedia Signal And Vision Processing(IEEE 2011) 1\u20136.","DOI":"10.1109\/CIMSIVP.2011.5949236"},{"key":"e_1_2_12_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-017-4388-4"},{"key":"e_1_2_12_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.02.019"},{"key":"e_1_2_12_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.05.032"},{"key":"e_1_2_12_23_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet\u2010ipr.2014.0689"},{"key":"e_1_2_12_24_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ipr.2009.0195"},{"key":"e_1_2_12_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2021.01.011"},{"key":"e_1_2_12_26_1","doi-asserted-by":"crossref","unstructured":"G.Xuan C.Yang Y.Zhen Y. Q.Shi andZ.Ni \u201cReversible Data Hiding Using Integer Wavelet Transform and Companding Technique \u201d inDigital Watermarking: Third International Workshop IWDW 2004(Springer 2005) 115\u2013124.","DOI":"10.1007\/978-3-540-31805-7_10"},{"key":"e_1_2_12_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2016.06.050"},{"key":"e_1_2_12_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/math11163619"},{"key":"e_1_2_12_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3427357"},{"key":"e_1_2_12_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3457690"},{"key":"e_1_2_12_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jestch.2025.102108"},{"key":"e_1_2_12_32_1","volume-title":"Introduction to Microcontrollers","author":"Gridling G.","year":"2007"},{"key":"e_1_2_12_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2017.10.013"},{"key":"e_1_2_12_34_1","unstructured":"\u201cArduino Due \u201d Arduino Official Store accessed May 12 2024 https:\/\/store.arduino.cc\/products\/arduino\u2010due."},{"key":"e_1_2_12_35_1","unstructured":"\u201cArduino\u2014Home \u201d Arduino accessed May 12 2024 https:\/\/www.arduino.cc\/."},{"key":"e_1_2_12_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-74748-9_2"},{"key":"e_1_2_12_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3203067"},{"key":"e_1_2_12_38_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13634-022-00938-4"},{"key":"e_1_2_12_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.optlaseng.2020.106346"},{"key":"e_1_2_12_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010020\u201009739\u2010z"},{"key":"e_1_2_12_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11042\u2010020\u201010311\u2010y"},{"key":"e_1_2_12_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-32-9453-0_13"},{"key":"e_1_2_12_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.950787"},{"key":"e_1_2_12_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cnsns.2013.10.014"},{"key":"e_1_2_12_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2016.2566261"},{"key":"e_1_2_12_46_1","unstructured":"\u201cComputer Vision Group (UGR) \u201dUniversidad de Granada accessed February 20 2023 https:\/\/ccia.ugr.es\/cvg\/index2.php."},{"key":"e_1_2_12_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2024.3432008"}],"container-title":["IET Image Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ipr2.70218","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/ipr2.70218","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/ipr2.70218","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T11:38:21Z","timestamp":1775216301000},"score":1,"resource":{"primary":{"URL":"https:\/\/ietresearch.onlinelibrary.wiley.com\/doi\/10.1049\/ipr2.70218"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["10.1049\/ipr2.70218"],"URL":"https:\/\/doi.org\/10.1049\/ipr2.70218","archive":["Portico"],"relation":{},"ISSN":["1751-9659","1751-9667"],"issn-type":[{"value":"1751-9659","type":"print"},{"value":"1751-9667","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1]]},"assertion":[{"value":"2025-04-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-11","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-09-23","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}],"article-number":"e70218"}}