{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T06:47:52Z","timestamp":1777704472094,"version":"3.51.4"},"reference-count":23,"publisher":"SAGE Publications","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2020,11,19]]},"abstract":"<jats:p>Most data hiding methods have limitations in resisting cropping and noise attacks. Aiming at this problem, a robust data hiding with multiple backups and optimized reference matrix is proposed in this paper. Specifically, secret data is divided into a set of groups and multiple backups of each group data are generated according to the number of backups. The cover image is divided into several blocks. A reference matrix is constructed by four constraints to assist data hiding and data extraction. The proposed method aims to extract exactly at least one backup of each group data so that the correct backups can construct the secret data well if the stego-image is corrupted. Experimental results show that the proposed algorithm is robust to cropping and noise attacks.<\/jats:p>","DOI":"10.3233\/jifs-200089","type":"journal-article","created":{"date-parts":[[2020,10,16]],"date-time":"2020-10-16T12:12:15Z","timestamp":1602850335000},"page":"6965-6977","source":"Crossref","is-referenced-by-count":1,"title":["Robust data hiding with multiple backups and optimized reference matrix"],"prefix":"10.1177","volume":"39","author":[{"given":"Xianquan","family":"Zhang","sequence":"first","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"},{"name":"Guangxi Colleges and Universities Key Laboratory of Cloud Computing and Complex Systems, Guilin University of Electronic Technology, Guilin, China"}]},{"given":"Ju","family":"Yang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"}]},{"given":"Yu","family":"Dong","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"}]},{"given":"Chunqiang","family":"Yu","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"}]},{"given":"Zhenjun","family":"Tang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-200089_ref1","doi-asserted-by":"crossref","first-page":"1490","DOI":"10.1109\/TMM.2008.2007334","article-title":"Fragile Watermarking With Error-Free Restoration Capability","volume":"10","author":"Zhang","year":"2008","journal-title":"IEEE Transactions on Multimedia"},{"key":"10.3233\/JIFS-200089_ref2","doi-asserted-by":"crossref","first-page":"2274","DOI":"10.1109\/TCSVT.2016.2587388","article-title":"Decomposing Joint Distortion for Adaptive Steganography","volume":"27","author":"Zhang","year":"2017","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.3233\/JIFS-200089_ref3","doi-asserted-by":"crossref","first-page":"680","DOI":"10.1109\/LCOMM.2007.070438","article-title":"Improving Embedding Efficiency of Covering Codes for Applications in Steganography","volume":"11","author":"Zhang","year":"2007","journal-title":"IEEE Communications Letters"},{"key":"10.3233\/JIFS-200089_ref4","doi-asserted-by":"crossref","unstructured":"Zhang X. and Wang S. , Efficient steganographic embedding by exploiting modification direction, IEEE Communications Letters 10 (2006).","DOI":"10.1109\/LCOMM.2006.060863"},{"key":"10.3233\/JIFS-200089_ref5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1016\/j.image.2016.03.007","article-title":"Geometrically invariant image watermarking based on fast Radial Harmonic Fourier Moments","volume":"45","author":"Wang","year":"2016","journal-title":"Signal Processing-image Communication"},{"issue":"6","key":"10.3233\/JIFS-200089_ref6","doi-asserted-by":"crossref","first-page":"8257","DOI":"10.1007\/s11042-016-3476-1","article-title":"Image encryption based on random projection partition and chaotic system","volume":"76","author":"Tang","year":"2017","journal-title":"Multimed Tools Appl"},{"key":"10.3233\/JIFS-200089_ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.optlaseng.2015.12.004","article-title":"Multiple-image encryption with bit-plane decomposition and chaotic maps","volume":"80","author":"Tang","year":"2016","journal-title":"Opt Laser Eng"},{"key":"10.3233\/JIFS-200089_ref8","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/93.959097","article-title":"Detecting LSB steganography in color, and gray-scale images","volume":"8","author":"Fridrich","year":"2001","journal-title":"IEEE MultiMedia"},{"key":"10.3233\/JIFS-200089_ref9","doi-asserted-by":"crossref","first-page":"848","DOI":"10.1109\/LSP.2007.903255","article-title":"A Double Layered \u201cPlus-Minus One\u201d Data Embedding Scheme","volume":"14","author":"Zhang","year":"2007","journal-title":"IEEE Signal Processing Letters"},{"key":"10.3233\/JIFS-200089_ref10","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1109\/LSP.2008.2008947","article-title":"A Generalization of LSB Matching","volume":"16","author":"Li","year":"2009","journal-title":"IEEE Signal Processing Letters"},{"key":"10.3233\/JIFS-200089_ref11","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1016\/j.patrec.2003.10.014","article-title":"Vulnerability of pixel-value differencing steganography to histogram analysis and modification for enhanced security","volume":"25","author":"Zhang","year":"2004","journal-title":"Pattern Recognition Letters"},{"key":"10.3233\/JIFS-200089_ref13","doi-asserted-by":"crossref","first-page":"707","DOI":"10.1007\/s11042-014-2016-0","article-title":"A novel data hiding for color images based on pixel value difference and modulus function","volume":"74","author":"Shen","year":"2015","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-200089_ref14","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.image.2016.10.005","article-title":"A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement","volume":"50","author":"Hussain","year":"2017","journal-title":"Signal Processing-image Communication"},{"key":"10.3233\/JIFS-200089_ref16","doi-asserted-by":"crossref","first-page":"1762","DOI":"10.1016\/j.ijleo.2015.08.056","article-title":"High capacity data hiding scheme based on multi-bit encoding function","volume":"127","author":"Kuo","year":"2016","journal-title":"Optik"},{"key":"10.3233\/JIFS-200089_ref18","doi-asserted-by":"crossref","first-page":"10648","DOI":"10.1016\/j.eswa.2011.02.122","article-title":"A steganographic scheme by fully exploiting modification directions","volume":"38","author":"Chang","year":"2011","journal-title":"Expert Systems With Applications"},{"issue":"6","key":"10.3233\/JIFS-200089_ref20","first-page":"561","article-title":"A novel technique for image steganography based on DWT and Huffman encoding","volume":"4","author":"Nag","year":"2011","journal-title":"Int J Comput Sci Secur"},{"issue":"1","key":"10.3233\/JIFS-200089_ref21","first-page":"17","article-title":"A secure color image steganography in transform domain","volume":"3","author":"Hemalatha","year":"2013","journal-title":"Int J Cryptography Inf Secur"},{"issue":"18","key":"10.3233\/JIFS-200089_ref22","doi-asserted-by":"crossref","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","article-title":"Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain","volume":"76","author":"Atawneh","year":"2017","journal-title":"Multimedia Tools Appl"},{"key":"10.3233\/JIFS-200089_ref23","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.jisa.2017.04.004","article-title":"A new transform domain steganography based on modified logistic chaotic map for color images[J]","volume":"34","author":"Valandar","year":"2017","journal-title":"Journal of Information Security and Applications"},{"issue":"11","key":"10.3233\/JIFS-200089_ref24","doi-asserted-by":"crossref","first-page":"13279","DOI":"10.1007\/s11042-017-4947-8","article-title":"A modified DWT-based image steganography technique[J]","volume":"77","author":"Kumar","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-200089_ref25","first-page":"331","article-title":"A data hiding scheme based on multidirectional line encoding and integer wavelet transform[J]","volume":"78","author":"Zhang","year":"2019","journal-title":"Signal Processing: Image Communication"},{"issue":"2","key":"10.3233\/JIFS-200089_ref26","first-page":"132","article-title":"An anti-cut data hiding algorithm","volume":"23","author":"Lei","year":"2014","journal-title":"Microelectronics and Computer"},{"key":"10.3233\/JIFS-200089_ref27","doi-asserted-by":"crossref","first-page":"3379","DOI":"10.1016\/j.ins.2011.04.007","article-title":"Tabu search based multi-watermarks embedding algorithm with multiple description coding","volume":"181","author":"Huang","year":"2011","journal-title":"Information Sciences"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-200089","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:41:18Z","timestamp":1777455678000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-200089"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,19]]},"references-count":23,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.3233\/jifs-200089","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,11,19]]}}}