{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T00:37:14Z","timestamp":1760143034163,"version":"build-2065373602"},"reference-count":23,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T00:00:00Z","timestamp":1705881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Future Internet"],"abstract":"<jats:p>Information has been uploaded and downloaded through the Internet, day in and day out, ever since we immersed ourselves in the Internet. Data security has become an area demanding high attention, and one of the most efficient techniques for protecting data is data hiding. In recent studies, it has been shown that the indices of a codebook can be reordered to hide secret bits. The hiding capacity of the codeword index reordering scheme increases when the size of the codebook increases. Since the codewords in the codebook are not modified, the visual performance of compressed images is retained. We propose a novel scheme making use of the fundamental principle of the codeword index reordering technique to hide secret data in encrypted images. By observing our experimental results, we can see that the obtained embedding capacity of 197,888 is larger than other state-of-the-art schemes. Secret data can be extracted when a receiver owns a data hiding key, and the image can be recovered when a receiver owns an encryption key.<\/jats:p>","DOI":"10.3390\/fi16010034","type":"journal-article","created":{"date-parts":[[2024,1,22]],"date-time":"2024-01-22T06:49:31Z","timestamp":1705906171000},"page":"34","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Innovative Information Hiding Scheme Based on Block-Wise Pixel Reordering"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3401-8742","authenticated-orcid":false,"given":"Jui-Chuan","family":"Liu","sequence":"first","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7780-8468","authenticated-orcid":false,"given":"Heng-Xiao","family":"Chi","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan"}]},{"given":"Ching-Chun","family":"Chang","sequence":"additional","affiliation":[{"name":"Information and Communication Security Research Center, Feng Chia University, Taichung 40724, Taiwan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7319-5780","authenticated-orcid":false,"given":"Chin-Chen","family":"Chang","sequence":"additional","affiliation":[{"name":"Department of Information Engineering and Computer Science, Feng Chia University, Taichung 40724, Taiwan"}]}],"member":"1968","published-online":{"date-parts":[[2024,1,22]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"30","DOI":"10.3390\/fi2010030","article-title":"Selective Redundancy Removal: A Framework for Data Hiding","volume":"2","author":"Fiore","year":"2010","journal-title":"Future Internet"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"393","DOI":"10.3390\/fi7040393","article-title":"Embedding an Identity-Based Short Signature as a Digital Watermark","volume":"7","author":"Fiore","year":"2015","journal-title":"Future Internet"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Pilania, U., Tanwar, R., Zamani, M., and Manaf, A.A. (2022). Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression. Future Internet, 14.","DOI":"10.3390\/fi14090254"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Liu, J.C., Chang, C.C., Lin, C.C., and Chang, C.C. (2023, January 14\u201316). Hiding Information in a Well-Trained Vector Quantization Codebook. Proceedings of the ACM International Conference on Signal Processing and Machine Learning (SPML), Tianjin, China.","DOI":"10.1145\/3614008.3614052"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TIP.2004.840686","article-title":"Lossless generalized-LSB data embedding","volume":"14","author":"Celik","year":"2005","journal-title":"IEEE Trans. Image Process"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3210","DOI":"10.1109\/ACCESS.2016.2573308","article-title":"Reversible data hiding: Advances in the past two decades","volume":"4","author":"Shi","year":"2016","journal-title":"IEEE Access"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1469","DOI":"10.1109\/TMM.2016.2569497","article-title":"Reversible data hiding in encrypted images by reversible image transformation","volume":"18","author":"Zhang","year":"2016","journal-title":"IEEE Trans. Multimed."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"553","DOI":"10.1109\/TIFS.2013.2248725","article-title":"Reversible data hiding in encrypted images by reserving room before encryption","volume":"8","author":"Ma","year":"2013","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1109\/TMM.2018.2844679","article-title":"Separable and reversible data hiding in encrypted images using parametric binary tree labeling","volume":"21","author":"Yi","year":"2019","journal-title":"IEEE Trans. Multimed."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/j.sigpro.2018.04.016","article-title":"Parametric reversible data hiding in encrypted images using adaptive bit-level data embedding and checkerboard-based prediction","volume":"150","author":"Yi","year":"2018","journal-title":"Signal Process."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1670","DOI":"10.1109\/TIFS.2018.2799381","article-title":"An efficient MSB prediction-based method for high-capacity reversible data hiding in encrypted images","volume":"13","author":"Pauline","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TCSVT.2020.2992817","article-title":"Multi-MSB compression based reversible data hiding scheme in encrypted images","volume":"31","author":"Chen","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/TMM.2020.2985537","article-title":"A recursive reversible data hiding in encrypted images method with a very high payload","volume":"23","author":"Puteaux","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1929","DOI":"10.1109\/TMM.2019.2952979","article-title":"An improved reversible data hiding in encrypted images using parametric binary tree labeling","volume":"22","author":"Wu","year":"2020","journal-title":"IEEE Trans. Multimed."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/LSP.2012.2187334","article-title":"An improved reversible data hiding in encrypted images using side match","volume":"19","author":"Hong","year":"2012","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"826","DOI":"10.1109\/TIFS.2011.2176120","article-title":"Separable reversible data hiding in encrypted image","volume":"7","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"636","DOI":"10.1109\/TCSVT.2015.2418611","article-title":"Reversible data hiding in encrypted images with distributed source encoding","volume":"26","author":"Qian","year":"2016","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/j.sigpro.2014.04.032","article-title":"High-capacity reversible data hiding in encrypted images by prediction error","volume":"104","author":"Wu","year":"2014","journal-title":"Signal Process."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2777","DOI":"10.1109\/TIFS.2016.2598528","article-title":"New framework for reversible data hiding in encrypted domain","volume":"11","author":"Huang","year":"2016","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2285","DOI":"10.1109\/TCSVT.2018.2863029","article-title":"A high capacity multi-level approach for reversible data hiding in encrypted images","volume":"29","author":"Ge","year":"2018","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.patrec.2018.01.014","article-title":"An improved block based joint reversible data hiding in encrypted images by symmetric cryptosystem","volume":"139","author":"Bhardwaj","year":"2020","journal-title":"Pattern Recognit. Lett."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"103421","DOI":"10.1016\/j.jvcir.2021.103421","article-title":"Reversal of pixel rotation: A reversible data hiding system towards cybersecurity in encrypted images","volume":"82","author":"Wang","year":"2022","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"116696","DOI":"10.1016\/j.image.2022.116696","article-title":"Reversible data hiding in encrypted images without additional information transmission","volume":"105","author":"Yu","year":"2022","journal-title":"Signal Process. Image Commun."}],"container-title":["Future Internet"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/1\/34\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T13:47:06Z","timestamp":1760104026000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-5903\/16\/1\/34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,22]]},"references-count":23,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["fi16010034"],"URL":"https:\/\/doi.org\/10.3390\/fi16010034","relation":{},"ISSN":["1999-5903"],"issn-type":[{"type":"electronic","value":"1999-5903"}],"subject":[],"published":{"date-parts":[[2024,1,22]]}}}