{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T00:59:30Z","timestamp":1769821170168,"version":"3.49.0"},"reference-count":23,"publisher":"SAGE Publications","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IFS"],"published-print":{"date-parts":[[2022,2,2]]},"abstract":"<jats:p>The embedding capacity and steganography quality are two important performance indicators of data hiding which has practical application value for copyright and intellectual property protection, public information protection and online elections. Many researches presented hiding methods to improve the performance. However, the existing data hiding methods have problems such as low embedding capacity or poor stego-image quality. This paper proposes a new method (Single Pixel Modification, SPM) to improve the performance further. The SPM (Single Pixel Modification) method embeds k secret bits into a cover-pixel with the idea that minimizing the change to cover-pixel and adopting modulus operation based on 2k. The experimental results show that the proposed method has better performance than methods compared and the highest hiding capacity can reach 4\u200abits per pixel and the average PSNR of stego-images is 34.83\u200adB. The source code and related materials are made to public to make it easy for researchers to verify the work and stimulate further research.<\/jats:p>","DOI":"10.3233\/jifs-211606","type":"journal-article","created":{"date-parts":[[2021,10,1]],"date-time":"2021-10-01T21:58:55Z","timestamp":1633125535000},"page":"2317-2329","source":"Crossref","is-referenced-by-count":1,"title":["A data hiding scheme based on single pixel modification with modulus operation"],"prefix":"10.1177","volume":"42","author":[{"given":"Sha","family":"Wang","sequence":"first","affiliation":[{"name":"College of Computer and Information Science, Southwest University, Chongqing, China"}]},{"given":"Teng","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer and Information Science, Southwest University, Chongqing, China"}]},{"given":"Zifeng","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Computer and Information Science, Southwest University, Chongqing, China"}]},{"given":"Dongbo","family":"Pan","sequence":"additional","affiliation":[{"name":"College of Artificial Intelligence, Southwest University, Chongqing, China"}]},{"given":"Yu","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer and Information Science, Southwest University, Chongqing, China"}]}],"member":"179","reference":[{"key":"10.3233\/JIFS-211606_ref1","first-page":"406","article-title":"A comprehensive study on image steganography and steganalysis techniques","volume":"7","author":"Amsaveni","year":"2015","journal-title":"Int J Inf Commun Technol"},{"key":"10.3233\/JIFS-211606_ref3","doi-asserted-by":"crossref","first-page":"2977","DOI":"10.3233\/JIFS-191478","article-title":"Reversible data hiding method based on pixel expansion and homomorphic encryption","volume":"39","author":"Anushiadevi","year":"2020","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-211606_ref4","doi-asserted-by":"crossref","first-page":"19695","DOI":"10.1007\/s11042-021-10729-y","article-title":"Uncover the cover to recover the hidden secret - A separable reversible data hiding framework","volume":"80","author":"Anushiadevi","year":"2021","journal-title":"Multimed Tools Appl"},{"key":"10.3233\/JIFS-211606_ref5","doi-asserted-by":"crossref","first-page":"6403","DOI":"10.3233\/JIFS-179721","article-title":"A high payload separable reversible data hiding in cipher image with good decipher image quality","volume":"38","author":"Anushiadevi","year":"2020","journal-title":"J Intell Fuzzy Syst"},{"key":"10.3233\/JIFS-211606_ref6","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1016\/j.patcog.2003.08.007","article-title":"Hiding data in images by simple LSB substitution","volume":"37","author":"Chan","year":"2004","journal-title":"Pattern Recognit"},{"key":"10.3233\/JIFS-211606_ref8","first-page":"79","article-title":"Improved Exploiting Modification Direction Method by Modulus Operation","volume":"2","author":"Jung","year":"2009","journal-title":"Image Process"},{"key":"10.3233\/JIFS-211606_ref9","unstructured":"Kaur R. , Singh G. and Singh S. , an Overview of Data Hiding Technique: - Steganography, 1 (2012), 34\u201336."},{"key":"10.3233\/JIFS-211606_ref11","unstructured":"Kessler G. , An Overview of Steganography for the Computer Forensics Examiner, Forensic Sci Commun 6 (2004)."},{"key":"10.3233\/JIFS-211606_ref12","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1007\/s11042-012-1114-0","article-title":"Data hiding by an improved exploiting modification direction","volume":"69","author":"Kim","year":"2014","journal-title":"Multimed Tools Appl"},{"key":"10.3233\/JIFS-211606_ref14","doi-asserted-by":"crossref","first-page":"1762","DOI":"10.1016\/j.ijleo.2015.08.056","article-title":"High capacity data hiding scheme based on multi-bit encoding function","volume":"127","author":"Kuo","year":"2016","journal-title":"Optik (Stuttg)"},{"key":"10.3233\/JIFS-211606_ref16","doi-asserted-by":"crossref","first-page":"39445","DOI":"10.1109\/ACCESS.2020.2975385","article-title":"Data Hiding Method Based on 3D Magic Cube","volume":"8","author":"Lee","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-211606_ref17","first-page":"497","article-title":"A steganographic method with high embedding capacity by improving exploiting modification direction, Proc. - 3rd Int. Conf. Intell. Inf. Hiding Multimed","volume":"1","author":"Lee","year":"2007","journal-title":"Signal Process. IIHMSP 2007"},{"key":"10.3233\/JIFS-211606_ref18","first-page":"1521","article-title":"High capacity information hiding method based on pixel-value adjustment with modulus operation","volume":"15","author":"Li","year":"2021","journal-title":"KSII Trans Internet Inf Syst"},{"key":"10.3233\/JIFS-211606_ref19","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1109\/LSP.2006.870357","article-title":"LSB matching revisited","volume":"13","author":"Mielikainen","year":"2006","journal-title":"IEEE Signal Process Lett"},{"key":"10.3233\/JIFS-211606_ref20","doi-asserted-by":"crossref","unstructured":"Processing I. , Kasana G. , Singh K. and Bhatia S.S. , EMD based steganography techniques for JPEG2000 encoded images, 15 (2017), 1\u201322.","DOI":"10.1142\/S0219691317500205"},{"key":"10.3233\/JIFS-211606_ref21","doi-asserted-by":"crossref","unstructured":"Poornima R. and Iswarya R.J. , An overview of digital image steganography, 4 (2013), 23\u201331.","DOI":"10.5121\/ijcses.2013.4102"},{"key":"10.3233\/JIFS-211606_ref24","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/j.cose.2014.07.008","article-title":"A data hiding scheme using pixel value differencing and improving exploiting modification directions","volume":"48","author":"Shen","year":"2015","journal-title":"Comput Secur"},{"key":"10.3233\/JIFS-211606_ref25","doi-asserted-by":"crossref","first-page":"4633","DOI":"10.1049\/iet-ipr.2019.1694","article-title":"Secure high capacity tetris-based scheme for data hiding","volume":"14","author":"Su","year":"2020","journal-title":"IET Image Process"},{"key":"10.3233\/JIFS-211606_ref26","doi-asserted-by":"crossref","first-page":"85367","DOI":"10.1109\/ACCESS.2020.2993604","article-title":"New High Capacity Reversible Data Hiding Using the Second-Order Difference Shifting","volume":"8","author":"Wang","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-211606_ref27","doi-asserted-by":"crossref","first-page":"164685","DOI":"10.1016\/j.ijleo.2020.164685","article-title":"Optik High-capacity adaptive steganography based on LSB and Hamming code","volume":"213","author":"Wang","year":"2020","journal-title":"Opt - Int J Light Electron Opt"},{"key":"10.3233\/JIFS-211606_ref28","doi-asserted-by":"crossref","first-page":"781","DOI":"10.1109\/LCOMM.2006.060863","article-title":"Efficient steganographic embedding by exploiting modification direction","volume":"10","author":"Zhang","year":"2006","journal-title":"IEEE Commun Lett"},{"key":"10.3233\/JIFS-211606_ref29","doi-asserted-by":"crossref","first-page":"85309","DOI":"10.1109\/ACCESS.2020.2992690","article-title":"Modulus Calculations on Prime Number Algorithm for Information Hiding With High Comprehensive Performance","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"},{"key":"10.3233\/JIFS-211606_ref30","doi-asserted-by":"crossref","first-page":"85309","DOI":"10.1109\/ACCESS.2020.2992690","article-title":"Modulus Calculations on Prime Number Algorithm for Information Hiding with High Comprehensive Performance","volume":"8","author":"Zhang","year":"2020","journal-title":"IEEE Access"}],"container-title":["Journal of Intelligent &amp; Fuzzy Systems"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/JIFS-211606","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T12:56:26Z","timestamp":1769777786000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/JIFS-211606"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,2]]},"references-count":23,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.3233\/jifs-211606","relation":{},"ISSN":["1064-1246","1875-8967"],"issn-type":[{"value":"1064-1246","type":"print"},{"value":"1875-8967","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,2]]}}}