{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T07:03:23Z","timestamp":1777705403303,"version":"3.51.4"},"reference-count":33,"publisher":"SAGE Publications","issue":"6","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2021,12,16]]},"abstract":"<jats:p>Digital images are easily corrupted by attacks during transmission and most data hiding methods have limitations in resisting cropping and noise attacks. Aiming at this problem, we propose a robust image data hiding method based on multiple backups and pixel bit weight (PBW). Especially multiple backups of every pixel bit are pre-embedded into a cover image according to a reference matrix. Since different pixel bits have different weights, the most significant bits (MSBs) occupy more weights on the secret image than those of the least significant bits (LSBs). Accordingly, some backups of LSBs are substituted by the MSBs to increase the backups of MSBs so that the quality of the extracted secret image can be improved. Experimental results show that the proposed algorithm is robust to cropping and noise attacks for secret image.<\/jats:p>","DOI":"10.3233\/jifs-210862","type":"journal-article","created":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T11:40:36Z","timestamp":1635507636000},"page":"6935-6948","source":"Crossref","is-referenced-by-count":0,"title":["Robust image data hiding method based on multiple backups and pixel bit weight"],"prefix":"10.1177","volume":"41","author":[{"given":"Yu","family":"Dong","sequence":"first","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"}]},{"given":"Xianquan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"}]},{"given":"Chunqiang","family":"Yu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Information Technology, Guangxi Normal University, Guilin, China"}]},{"given":"Zhenjun","family":"Tang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-Source Information Mining & Security, Guangxi Normal University, Guilin, China"}]},{"given":"Guoen","family":"Xia","sequence":"additional","affiliation":[{"name":"School of Business Administration, Guangxi University of Finance and Economics, Nanning, China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-210862_ref1","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1016\/j.sigpro.2018.07.008","article-title":"Separable reversible data hiding in encrypted images via adaptive embedding strategy with block selection","volume":"153","author":"Qin","year":"2018","journal-title":"Signal Processing"},{"issue":"1","key":"10.3233\/JIFS-210862_ref2","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1109\/TMM.2019.2924576","article-title":"STAT: Spatial-Temporal Attention Mechanism for Video Captioning","volume":"22","author":"Yan","year":"2020","journal-title":"IEEE Transactions on Multimedia"},{"key":"10.3233\/JIFS-210862_ref3","doi-asserted-by":"crossref","first-page":"3341","DOI":"10.1109\/TCSVT.2018.2878026","article-title":"Flexible lossy compression for selective encrypted image with image inpainting","volume":"29","author":"Qin","year":"2018","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"issue":"3","key":"10.3233\/JIFS-210862_ref4","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1109\/TKDE.2013.45","article-title":"Robust perceptual image hashing based on ring partition and NMF","volume":"26","author":"Tang","year":"2014","journal-title":"IEEE transactions on knowledge and data engineering"},{"issue":"1","key":"10.3233\/JIFS-210862_ref5","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1109\/TIFS.2015.2485163","article-title":"Robust image hashing with ring partition and invariant vector distance","volume":"11","author":"Tang","year":"2016","journal-title":"IEEE transactions on information forensics and security"},{"issue":"6","key":"10.3233\/JIFS-210862_ref6","doi-asserted-by":"crossref","first-page":"1515","DOI":"10.1109\/TIFS.2018.2881677","article-title":"Encryption-Then-Compression Systems Using Grayscale-Based Image Encryption for JPEG Images","volume":"14","author":"Chuman","year":"2019","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"10.3233\/JIFS-210862_ref7","doi-asserted-by":"crossref","unstructured":"Wang Z. and Meng X. , Digital image information hiding algorithmresearch based on LDPC code,Article number:, EURASIP Journal on Image and Video Processing 92 (2018).","DOI":"10.1186\/s13640-018-0335-1"},{"key":"10.3233\/JIFS-210862_ref8","doi-asserted-by":"crossref","first-page":"76956","DOI":"10.1109\/ACCESS.2018.2882563","article-title":"Separable and Error-Free Reversible Data Hiding in Encrypted Image Based on Two-Layer Pixel Errors","volume":"6","author":"Yu","year":"2018","journal-title":"IEEE Access"},{"issue":"3","key":"10.3233\/JIFS-210862_ref9","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1109\/MMUL.2018.112142509","article-title":"Non-uniform Watermark Sharing Based on Optimal Iterative BTC for Image Tampering Recovery","volume":"25","author":"Qin","year":"2018","journal-title":"IEEE Multi Media"},{"key":"10.3233\/JIFS-210862_ref10","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1109\/LSP.2006.882092","article-title":"Watermarking scheme capable of resisting sensitivity attack","volume":"14","author":"Zhang","year":"2007","journal-title":"IEEE Signal Processing Letters"},{"issue":"5","key":"10.3233\/JIFS-210862_ref11","doi-asserted-by":"crossref","first-page":"1047","DOI":"10.1109\/TCSVT.2016.2633878","article-title":"Blind Dual Watermarking for Color Images\u2019 Authentication and Copyright Protection","volume":"28","author":"Liu","year":"2018","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.3233\/JIFS-210862_ref12","doi-asserted-by":"crossref","first-page":"594","DOI":"10.1109\/TCSVT.2018.2881118","article-title":"Towards robust image steganography","volume":"29","author":"Tao","year":"2018","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"10.3233\/JIFS-210862_ref13","doi-asserted-by":"crossref","first-page":"874","DOI":"10.1109\/TMM.2019.2936314","article-title":"Reversible data hiding in encrypted images based on multi-MSB prediction and Huffman coding","volume":"22","author":"Yin","year":"2019","journal-title":"IEEE Transactions on Multimedia"},{"issue":"8","key":"10.3233\/JIFS-210862_ref14","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"7","key":"10.3233\/JIFS-210862_ref15","doi-asserted-by":"crossref","first-page":"1109","DOI":"10.1109\/TCSVT.2012.2224052","article-title":"An inpainting-assisted reversible steganographic scheme using a histogram shifting mechanism","volume":"23","author":"Qin","year":"2013","journal-title":"IEEE Trans Circuits Syst Video Technol"},{"issue":"1","key":"10.3233\/JIFS-210862_ref16","first-page":"935","article-title":"Ashwak et al., Image steganography using least significant bit and secret map techniques","volume":"10","author":"Labaichi","year":"2020","journal-title":"International Journal of Electrical and Computer Engineering"},{"key":"10.3233\/JIFS-210862_ref17","first-page":"31","article-title":"A Development of Least Significant Bit Steganography Technique","volume":"20","author":"Msallam","year":"2020","journal-title":"Iraqi Journal of Computers Communications Control and Systems Engineering"},{"key":"10.3233\/JIFS-210862_ref19","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1016\/j.image.2016.10.005","article-title":"A data hiding scheme using parity-bit pixel value differencing and improved rightmost digit replacement","volume":"50","author":"Hussain","year":"2017","journal-title":"Signal Processing-image Communication"},{"key":"10.3233\/JIFS-210862_ref20","doi-asserted-by":"crossref","unstructured":"Zhang X. and Wang S. , Efficient steganographic embedding by exploiting modification direction, IEEE Communications Letters 10 (2006).","DOI":"10.1109\/LCOMM.2006.060863"},{"key":"10.3233\/JIFS-210862_ref21","doi-asserted-by":"crossref","first-page":"1762","DOI":"10.1016\/j.ijleo.2015.08.056","article-title":"High capacity data hiding scheme based on multi-bit encoding function","volume":"127","author":"Kuo","year":"2016","journal-title":"Optik"},{"key":"10.3233\/JIFS-210862_ref22","doi-asserted-by":"crossref","unstructured":"Chen M. , et al., Analysis of current steganography tools: classifications & features, International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP\u201906), California, USA, (2006).","DOI":"10.1109\/IIH-MSP.2006.265023"},{"key":"10.3233\/JIFS-210862_ref23","doi-asserted-by":"crossref","first-page":"141342","DOI":"10.1109\/ACCESS.2020.3011970","article-title":"Ultrasound Image Filtering and Reconstruction Using DCT\/IDCT Filter Structure","volume":"8","author":"Asli","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-210862_ref24","doi-asserted-by":"crossref","first-page":"60019","DOI":"10.1109\/ACCESS.2020.2981814","article-title":"Multi-Focus Image Fusion Using Geometric Algebra Based Discrete Fourier Transform","volume":"8","author":"Li","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-210862_ref25","doi-asserted-by":"crossref","first-page":"6601","DOI":"10.1109\/TIP.2020.2992177","article-title":"Polarimetric SAR Image Semantic Segmentation With 3D Discrete Wavelet Transform and Markov Random Field","volume":"29","author":"Bi","year":"2020","journal-title":"IEEE Transactions on Image Processing"},{"issue":"6","key":"10.3233\/JIFS-210862_ref26","first-page":"561","article-title":"A novel technique for image steganography based on DWT and Huffman encoding","volume":"4","author":"Nag","year":"2011","journal-title":"Int J Comput Sci Secur"},{"issue":"1","key":"10.3233\/JIFS-210862_ref27","first-page":"17","article-title":"A secure color image steganography in transform domain","volume":"3","author":"Hemalatha","year":"2013","journal-title":"Int J Cryptography Inf Secur"},{"issue":"18","key":"10.3233\/JIFS-210862_ref28","doi-asserted-by":"crossref","first-page":"18451","DOI":"10.1007\/s11042-016-3930-0","article-title":"Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain","volume":"76","author":"Atawneh","year":"2017","journal-title":"Multimedia Tools Appl"},{"key":"10.3233\/JIFS-210862_ref29","doi-asserted-by":"crossref","first-page":"142","DOI":"10.1016\/j.jisa.2017.04.004","article-title":"A new transform domain steganography based on modified logistic chaotic map for color images","volume":"34","author":"Valandar","year":"2017","journal-title":"Journal of Information Security and Applications"},{"issue":"11","key":"10.3233\/JIFS-210862_ref30","doi-asserted-by":"crossref","first-page":"13279","DOI":"10.1007\/s11042-017-4947-8","article-title":"A modified DWT-based image steganography technique","volume":"77","author":"Kumar","year":"2018","journal-title":"Multimedia Tools and Applications"},{"key":"10.3233\/JIFS-210862_ref31","first-page":"331","article-title":"A data hiding scheme based on multidirectional line encoding and integer wavelet transform","volume":"78","author":"Zhang","year":"2019","journal-title":"Signal Processing: Image Communication"},{"issue":"2","key":"10.3233\/JIFS-210862_ref32","first-page":"132","article-title":"An anti-cut data hiding algorithm","volume":"23","author":"Lei","year":"2014","journal-title":"Microelectronics and Computer"},{"issue":"10","key":"10.3233\/JIFS-210862_ref33","doi-asserted-by":"crossref","first-page":"1054","DOI":"10.1145\/4372.4375","article-title":"Orthogonal Latin squares: an application of experiment design to compiler testing","volume":"28","author":"Mandl","year":"1985","journal-title":"Communications of The ACM"},{"issue":"5","key":"10.3233\/JIFS-210862_ref34","doi-asserted-by":"crossref","first-page":"6965","DOI":"10.3233\/JIFS-200089","article-title":"Robust data hiding with multiple backups and optimized reference matrix","volume":"39","author":"Zhang","year":"2020","journal-title":"Journal of Intelligent and Fuzzy Systems"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-210862","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:43:44Z","timestamp":1777455824000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-210862"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,16]]},"references-count":33,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.3233\/jifs-210862","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,12,16]]}}}