{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:47:08Z","timestamp":1760147228507,"version":"build-2065373602"},"reference-count":27,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T00:00:00Z","timestamp":1673827200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Higher Education Malaysia","award":["KPT FRGS\/1\/2020\/ICT07\/UMS\/02\/1","62162006"],"award-info":[{"award-number":["KPT FRGS\/1\/2020\/ICT07\/UMS\/02\/1","62162006"]}]},{"name":"National Natural Science Foundation of China","award":["KPT FRGS\/1\/2020\/ICT07\/UMS\/02\/1","62162006"],"award-info":[{"award-number":["KPT FRGS\/1\/2020\/ICT07\/UMS\/02\/1","62162006"]}]},{"name":"Guangxi Key Laboratory of Big Data in Finance and Economics","award":["KPT FRGS\/1\/2020\/ICT07\/UMS\/02\/1","62162006"],"award-info":[{"award-number":["KPT FRGS\/1\/2020\/ICT07\/UMS\/02\/1","62162006"]}]},{"name":"Guangxi First-class Discipline Statistics Construction Project Fund","award":["KPT FRGS\/1\/2020\/ICT07\/UMS\/02\/1","62162006"],"award-info":[{"award-number":["KPT FRGS\/1\/2020\/ICT07\/UMS\/02\/1","62162006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Image coding technology has become an indispensable technology in the field of modern information. With the vigorous development of the big data era, information security has received more attention. Image steganography is an important method of image encoding and hiding, and how to protect information security with this technology is worth studying. Using a basis of mathematical modeling, this paper makes innovations not only in improving the theoretical system of kernel function but also in constructing a random matrix to establish an information-hiding scheme. By using the random matrix as the reference matrix for secret-information steganography, due to the characteristics of the random matrix, the secret information set to be retrieved is very small, reducing the modification range of the steganography image and improving the steganography image quality and efficiency. This scheme can maintain the steganography image quality with a PSNR of 49.95 dB and steganography of 1.5 bits per pixel and can ensure that the steganography efficiency is improved by reducing the steganography set. In order to adapt to different steganography requirements and improve the steganography ability of the steganography schemes, this paper also proposes an adaptive large-capacity information-hiding scheme based on the random matrix. In this scheme, a method of expanding the random matrix is proposed, which can generate a corresponding random matrix according to different steganography capacity requirements to achieve the corresponding secret-information steganography. Two schemes are demonstrated through simulation experiments as well as an analysis of the steganography efficiency, steganography image quality, and steganography capacity and security. The experimental results show that the latter two schemes are better than the first two in terms of steganography capacity and steganography image quality.<\/jats:p>","DOI":"10.3390\/s23021017","type":"journal-article","created":{"date-parts":[[2023,1,16]],"date-time":"2023-01-16T01:31:15Z","timestamp":1673832675000},"page":"1017","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Random Matrix Transformation and Its Application in Image Hiding"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4038-2368","authenticated-orcid":false,"given":"Jijun","family":"Wang","sequence":"first","affiliation":[{"name":"Faculty of Computing and Informatics, Universiti Malaysia Sabah (UMS), Kota Kinabalu 88400, Malaysia"},{"name":"Guangxi Key Laboratory of Big Data in Finance and Economics, Nanning 530003, China"},{"name":"Faculty of Big Data and Artificial Intelligence, Guangxi University of Finance and Economics, Nanning 530003, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5025-2084","authenticated-orcid":false,"given":"Fun Soo","family":"Tan","sequence":"additional","affiliation":[{"name":"Faculty of Computing and Informatics, Universiti Malaysia Sabah (UMS), Kota Kinabalu 88400, Malaysia"}]},{"given":"Yi","family":"Yuan","sequence":"additional","affiliation":[{"name":"Faculty of Computing and Informatics, Universiti Malaysia Sabah (UMS), Kota Kinabalu 88400, Malaysia"}]}],"member":"1968","published-online":{"date-parts":[[2023,1,16]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"106237","DOI":"10.1016\/j.optlastec.2020.106237","article-title":"Hiding data with simplified diffractive imaging based hybrid method","volume":"128","author":"Hazer","year":"2020","journal-title":"Opt. Laser Technol."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"103391","DOI":"10.1016\/j.dsp.2022.103391","article-title":"A multi-party secure encryption-sharing hybrid scheme for image data base on compressed sensing","volume":"123","author":"Wu","year":"2022","journal-title":"Digit. Signal Process."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"107563","DOI":"10.1016\/j.sigpro.2020.107563","article-title":"Image encryption and hiding algorithm based on compressive sensing and random numbers insertion","volume":"172","author":"Ye","year":"2020","journal-title":"Signal Process."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"1091","DOI":"10.1007\/s40995-020-00905-4","article-title":"Image compression and encryption combining autoencoder and chaotic logistic map","volume":"44","author":"Sankar","year":"2020","journal-title":"Iran. J. Sci. Technol. Trans. A Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"597","DOI":"10.1007\/s10845-020-01590-1","article-title":"Visual sensor intelligent module based image transmission in industrial manufacturing for monitoring and manipulation problems","volume":"32","author":"Alhayani","year":"2021","journal-title":"J. Intell. Manuf."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"ElKamchouchi, D.H., Mohamed, H.G., and Moussa, K.H. (2020). A bijective image encryption system based on hybrid chaotic map diffusion and DNA confusion. Entropy, 22.","DOI":"10.3390\/e22020180"},{"key":"ref_7","first-page":"844","article-title":"Level by level image compression-encryption algorithm based on quantum chaos map","volume":"33","author":"Singh","year":"2021","journal-title":"J. King Saud Univ.-Comput. Inf. Sci."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"105701","DOI":"10.1088\/2040-8986\/aba47f","article-title":"Multiple-image hybrid encryption based on compressive sensing and diffractive imaging","volume":"22","author":"Hazer","year":"2020","journal-title":"J. Opt."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1291","DOI":"10.1109\/TCSI.2021.3133318","article-title":"A new full chaos coupled mapping lattice and its application in privacy image encryption","volume":"69","author":"Wang","year":"2021","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"25707","DOI":"10.1007\/s11042-019-07808-6","article-title":"Visually meaningful image encryption using data hiding and chaotic compressive sensing","volume":"78","author":"Ponuma","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"21165","DOI":"10.1007\/s11042-021-10723-4","article-title":"Hybrid data encryption model integrating multi-objective adaptive genetic algorithm for secure medical data communication over cloud-based healthcare systems","volume":"80","author":"Denis","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1109\/MMUL.2020.2993269","article-title":"Compression-then-encryption-based secure watermarking technique for smart healthcare system","volume":"27","author":"Anand","year":"2020","journal-title":"IEEE MultiMedia"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"126683","DOI":"10.1016\/j.optcom.2020.126683","article-title":"Exploiting optical chaos for double images encryption with compressive sensing and double random phase encoding","volume":"484","author":"Jiang","year":"2021","journal-title":"Opt. Commun."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"14379","DOI":"10.1007\/s11042-018-6795-6","article-title":"A medical image crypto-compression algorithm based on neural network and PWLCM","volume":"78","author":"Hajjaji","year":"2019","journal-title":"Multimed. Tools Appl."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"102465","DOI":"10.1016\/j.bspc.2021.102465","article-title":"A modified salp swarm algorithm (SSA) combined with a chaotic coupled map lattices (CML) approach for the secured encryption and compression of medical images during data transmission","volume":"66","author":"Selvi","year":"2021","journal-title":"Biomed. Signal Process. Control"},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"166748","DOI":"10.1016\/j.ijleo.2021.166748","article-title":"A fast image encryption algorithm based on parallel compressive sensing and DNA sequence","volume":"238","author":"Wei","year":"2021","journal-title":"Optik"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"105703","DOI":"10.1016\/j.optlastec.2019.105703","article-title":"An encryption system for color image based on compressive sensing","volume":"120","author":"Yao","year":"2019","journal-title":"Opt. Laser Technol."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"111539","DOI":"10.1016\/j.chaos.2021.111539","article-title":"Image encryption-then-transmission combining random sub-block scrambling and loop DNA algorithm in an optical chaotic system","volume":"153","author":"Dong","year":"2021","journal-title":"Chaos Solitons Fractals"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1007\/s11071-021-07192-7","article-title":"A fast and efficient multiple images encryption based on single-channel encryption and chaotic system","volume":"108","author":"Gao","year":"2022","journal-title":"Nonlinear Dyn."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1080\/09500340.2021.1924885","article-title":"A novel image encryption using random matrix affine cipher and the chaotic maps","volume":"68","author":"Lone","year":"2021","journal-title":"J. Mod. Opt."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Jin, X., Duan, X., Jin, H., and Ma, Y. (2020). A novel hybrid secure image encryption based on the shuffle algorithm and the hidden attractor chaos system. Entropy, 22.","DOI":"10.3390\/e22060640"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"5413","DOI":"10.1007\/s12652-020-02028-5","article-title":"A secure medical image transmission algorithm based on binary bits and Arnold map","volume":"12","author":"Madhusudhan","year":"2021","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"2485","DOI":"10.1007\/s11042-016-4280-7","article-title":"A hybrid encryption\/hiding method for secure transmission of biometric data in multimodal authentication system","volume":"77","author":"Tarif","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"486","DOI":"10.1016\/j.dcan.2020.02.001","article-title":"Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution","volume":"6","author":"Setyaningsih","year":"2020","journal-title":"Digit. Commun. Netw."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"105202","DOI":"10.1088\/1402-4896\/ac0bcf","article-title":"Public key image encryption algorithm based on pixel information and random number insertion","volume":"96","author":"Wu","year":"2021","journal-title":"Phys. Scr."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"166513","DOI":"10.1109\/ACCESS.2020.3023197","article-title":"High embedding capacity data hiding technique based on EMSD and LSB substitution algorithms","volume":"8","author":"Solak","year":"2020","journal-title":"IEEE Access"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Sahu, A.K., Hassaballah, M., Rao, R.S., and Suresh, G. (2022). Logistic-map based fragile image watermarking scheme for tamper detection and localization. Multimed Tools Appl.","DOI":"10.1007\/s11042-022-13630-4"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/2\/1017\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T18:06:58Z","timestamp":1760119618000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/2\/1017"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,16]]},"references-count":27,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["s23021017"],"URL":"https:\/\/doi.org\/10.3390\/s23021017","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2023,1,16]]}}}