{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T00:49:07Z","timestamp":1775695747223,"version":"3.50.1"},"reference-count":48,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T00:00:00Z","timestamp":1644192000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Entropy"],"abstract":"<jats:p>On the basis of ensuring the quality and concealment of steganographic images, this paper proposes a double-matrix decomposition image steganography scheme with multi-region coverage, to solve the problem of poor extraction ability of steganographic images under attack or interference. First of all, the cover image is transformed by multi-wavelet transform, and the hidden region covering multiple wavelet sub-bands is selected in the wavelet domain of the cover image to embed the secret information. After determining the hidden region, the hidden region is processed by Arnold transform, Hessenberg decomposition, and singular-value decomposition. Finally, the secret information is embedded into the cover image by embedding intensity factor. In order to ensure robustness, the hidden region selected in the wavelet domain is used as the input of Hessenberg matrix decomposition, and the robustness of the algorithm is further enhanced by Hessenberg matrix decomposition and singular-value decomposition. Experimental results show that the proposed method has excellent performance in concealment and quality of extracted secret images, and secret information is extracted from steganographic images attacked by various image processing attacks, which proves that the proposed method has good anti-attack ability under different attacks.<\/jats:p>","DOI":"10.3390\/e24020246","type":"journal-article","created":{"date-parts":[[2022,2,7]],"date-time":"2022-02-07T20:36:42Z","timestamp":1644266202000},"page":"246","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Double-Matrix Decomposition Image Steganography Scheme Based on Wavelet Transform with Multi-Region Coverage"],"prefix":"10.3390","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2310-9434","authenticated-orcid":false,"given":"Ping","family":"Pan","sequence":"first","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zeming","family":"Wu","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Chen","family":"Yang","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bing","family":"Zhao","sequence":"additional","affiliation":[{"name":"Electronic Engineering College, Heilongjiang University, Harbin 150080, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2022,2,7]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Shih, F.Y. (2017). Digital Watermarking and Steganography: Fundamentals and Techniques, CRC Press. [1st ed.].","DOI":"10.1201\/9781315219783"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"23409","DOI":"10.1109\/ACCESS.2021.3053998","article-title":"Image Steganography: A Review of the Recent Advances","volume":"9","author":"Sumbramanian","year":"2021","journal-title":"IEEE Access"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1016\/j.ins.2012.01.010","article-title":"An intelligent chaotic embedding approach to enhance stego-image quality","volume":"193","author":"Amirtharajan","year":"2012","journal-title":"Inform. Sci."},{"key":"ref_4","first-page":"101","article-title":"Data Hiding: Current Trends, Innovation and Potential Challenges","volume":"16","author":"Singh","year":"2021","journal-title":"ACM Trans. Multimed. Comput. Commun. Appl."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"727","DOI":"10.1016\/j.sigpro.2009.08.010","article-title":"Digital image steganography: Survey and analysis of current methods","volume":"90","author":"Cheddad","year":"2010","journal-title":"Signal Process."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1016\/j.swevo.2013.02.002","article-title":"An unsupervised multi-swarm clustering technique for","volume":"11","author":"Fornarelli","year":"2013","journal-title":"Swarm Evol. Comput."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1873","DOI":"10.1080\/09720529.2021.1962025","article-title":"Review on spatial domain image steganography techniques","volume":"24","author":"Sirisha","year":"2021","journal-title":"J. Discret. Math. Sci. Cryptogr."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1016\/j.cosrev.2014.09.001","article-title":"Current status and key issues in image steganography: A survey","volume":"13\u201314","author":"Subhedar","year":"2014","journal-title":"Comput. Sci. Rev."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"957","DOI":"10.21123\/bsj.2021.18.2(Suppl.).0957","article-title":"A Comprehensive Review on Medical Image Steganography Based on LSB Technique and Potential Challenges","volume":"18","author":"Shtayt","year":"2021","journal-title":"Baghdad Sci. J."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"23393","DOI":"10.1007\/s11042-020-10224-w","article-title":"A new data hiding approach for image steganography based on visual color sensitivity","volume":"80","author":"AbdelRaouf","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","first-page":"143","article-title":"A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB","volume":"21","author":"Bawaneh","year":"2021","journal-title":"Int. J. Comput. Sci. Netw. Secur."},{"key":"ref_12","first-page":"1","article-title":"Data Hiding Using PVD and Improving Security Using RSA","volume":"2021","author":"Jeyaprakash","year":"2021","journal-title":"J. Appl. Seurity Res."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"6610678","DOI":"10.1155\/2021\/6610678","article-title":"A New Method of Coding for Steganography Based on LSB Matching Revisited","volume":"2021","author":"Fateh","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1583","DOI":"10.1016\/S0031-3203(02)00289-3","article-title":"Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy","volume":"36","author":"Chang","year":"2003","journal-title":"Pattern Recognit."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1016\/j.patcog.2005.12.011","article-title":"Image hiding scheme with modulus function and dynamic programming strategy on partitioned pixels","volume":"39","author":"Chang","year":"2006","journal-title":"Pattern Recognit."},{"key":"ref_16","first-page":"640","article-title":"Using PSO in a spatial domain based image hiding scheme with distortion tolerance","volume":"39","author":"Bedi","year":"2013","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_17","first-page":"259","article-title":"Using PSO in image hiding scheme based on LSB substitution","volume":"192","author":"Bedi","year":"2011","journal-title":"Commun. Comput. Inf. Sci."},{"key":"ref_18","first-page":"444","article-title":"Survey on Steganography using Reversible Texture Synthesis","volume":"5","author":"Mol","year":"2016","journal-title":"Int. J. Eng. Res."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TIFS.2007.905146","article-title":"Reversible image watermarking based on integer-to-integer wavelet transform","volume":"2","author":"Lee","year":"2007","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","first-page":"1","article-title":"High capacity steganography: A global-adaptive region discrete cosine transform approach","volume":"72","author":"Rabie","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/S0020-0255(01)00194-3","article-title":"A steganographic method based upon JPEG and quantization table modification","volume":"141","author":"Chang","year":"2002","journal-title":"Inform. Sci."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"13493","DOI":"10.1007\/s11042-016-3722-6","article-title":"A new adaptive image steganography scheme based on DCT and chaotic map","volume":"76","author":"Saidi","year":"2017","journal-title":"Multimed. Tools Appl."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2154001","DOI":"10.1142\/S021800142154001X","article-title":"A Novel Steganography Algorithm Based on Quantization Table Modification and Image Scrambling in DCT Domain","volume":"35","author":"Dai","year":"2021","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1016\/j.jss.2008.07.008","article-title":"A HDWT-based reversible data hiding method","volume":"82","author":"Chan","year":"2009","journal-title":"J. Syst. Softw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"1898","DOI":"10.1016\/j.cnsns.2013.10.014","article-title":"A robust chaotic algorithm for digital im-age steganography","volume":"19","author":"Ghebleh","year":"2014","journal-title":"Commun. Nonlinear Sci. Numer. Simul."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.eswa.2015.12.010","article-title":"Imperceptibility\u2014Robustness tradeoff studies for ECG steganography using continuous ant colony optimization","volume":"49","author":"Ramu","year":"2016","journal-title":"Expert Syst. Appl."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.ijleo.2017.07.043","article-title":"Adaptive image steganography based on transform domain via genetic algorithm","volume":"145","author":"Miri","year":"2017","journal-title":"Optik"},{"key":"ref_28","first-page":"13","article-title":"Image steganography using cosine transform with large scale multimedia application","volume":"79","author":"Li","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"23673","DOI":"10.1007\/s11042-018-5713-2","article-title":"Enhanced high capacity image steganography using discrete wavelet transform and the Laplacian pyramid","volume":"77","author":"Raie","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_30","first-page":"92","article-title":"A color image steganography in hybrid FRT-DWT domain","volume":"40","author":"Thanki","year":"2018","journal-title":"Int. J. Inform. Sec. Appl."},{"key":"ref_31","first-page":"154","article-title":"A Daubechies DWT Based Image Steganography Using Smoothing Operation","volume":"17","author":"Sharma","year":"2020","journal-title":"Int. Arab. J. Inf. Technol."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"1113","DOI":"10.18280\/ts.380422","article-title":"Spectral Graph Wavelet Based Image Steganography Using SVD and Arnold Transform","volume":"38","author":"Chaudhary","year":"2021","journal-title":"Traitement Du Signal"},{"key":"ref_33","first-page":"358","article-title":"A Modified High Capacity Image Steganography Technique Based on Wavelet Transform","volume":"7","year":"2010","journal-title":"Int. Arab. J. Inf. Technol."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"11217","DOI":"10.1007\/s11042-020-10316-7","article-title":"An algorithm for embedding information in digitalimages based on discrete wavelet transformand learning automata","volume":"80","author":"Oleg","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"2021","DOI":"10.1007\/s11128-020-02952-7","article-title":"Three-level quantum image encryption based on Arnold transform and logistic map","volume":"20","author":"Liu","year":"2021","journal-title":"Quantum Inf. Process."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1016\/j.aeue.2017.05.025","article-title":"A novel blind color image watermarking using upper Hessenberg matrix","volume":"78","author":"Su","year":"2017","journal-title":"AEU-Int. J. Electron. Commun."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"5510125","DOI":"10.1155\/2021\/5510125","article-title":"A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain","volume":"2021","author":"Sangwan","year":"2021","journal-title":"Int. J. Opt."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Wang, L.Y., and Hai, C. (2019). Pseudo-Random Number Generator Based on Logistic Chaotic System. Entropy, 21.","DOI":"10.3390\/e21100960"},{"key":"ref_39","first-page":"24091","article-title":"A security enhanced robust audio steganography algorithm for image hiding using sample comparison in discrete wavelet transform domain and RSA encryption","volume":"76","author":"Korany","year":"2016","journal-title":"Multimed. Tools Appl."},{"key":"ref_40","first-page":"30","article-title":"Level set method based on texture similarity and edge information for segmenting texture images","volume":"45","author":"Deng","year":"2022","journal-title":"J. Hefei Univ. Technol."},{"key":"ref_41","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/s00138-021-01227-0","article-title":"A robust information hiding algorithm based on lossless encryption and NSCT-HD-SVD","volume":"32","author":"Singh","year":"2021","journal-title":"Mach. Vis. Appl."},{"key":"ref_42","first-page":"121","article-title":"An SVD-based watermarking scheme for protecting rightful ownership","volume":"4","author":"Liu","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_43","first-page":"56","article-title":"Robust image steganography using complex wavelet transform","volume":"2013","author":"Siddharth","year":"2013","journal-title":"Impact"},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/j.dsp.2014.12.005","article-title":"A new robust lossless data hiding scheme and its application to color medical images","volume":"38","author":"Thabit","year":"2015","journal-title":"Digit. Signal Process."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1016\/j.asoc.2015.01.032","article-title":"An adaptive image steganographic scheme based on noise visibility function and an optimal chaotic based encryption method","volume":"30","author":"Sajasi","year":"2015","journal-title":"Appl. Soft Comput."},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"6123","DOI":"10.1016\/j.eswa.2014.04.022","article-title":"A novel image steganography scheme with high embedding capacity and tunable visual image quality based on a genetic algorithm","volume":"41","author":"Kanan","year":"2014","journal-title":"Expert Syst. Appl."},{"key":"ref_47","doi-asserted-by":"crossref","first-page":"684824","DOI":"10.1155\/2015\/684824","article-title":"An Image Steganography Method Hiding Secret Data into Coefficients of Integer Wavelet Transform Using Pixel Value Differencing Approach","volume":"2015","author":"Gulve","year":"2015","journal-title":"Math. Probl. Eng."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.compeleceng.2016.04.017","article-title":"Image steganography using redundant discrete wavelet transform and QR factorization","volume":"54","author":"Subhedar","year":"2016","journal-title":"Comput. Electr. Eng."}],"container-title":["Entropy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/2\/246\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:15:38Z","timestamp":1760134538000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1099-4300\/24\/2\/246"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,7]]},"references-count":48,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,2]]}},"alternative-id":["e24020246"],"URL":"https:\/\/doi.org\/10.3390\/e24020246","relation":{},"ISSN":["1099-4300"],"issn-type":[{"value":"1099-4300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,2,7]]}}}