{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T02:44:47Z","timestamp":1760150687951,"version":"build-2065373602"},"reference-count":28,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T00:00:00Z","timestamp":1703808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102101","2021SDKYA101"],"award-info":[{"award-number":["62102101","2021SDKYA101"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Doctoral Scientific Research Foundation of Guangdong Polytechnic Normal University","award":["62102101","2021SDKYA101"],"award-info":[{"award-number":["62102101","2021SDKYA101"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Multi-party reversible data hiding over ciphered images (MRDH-CI) has high restorability since the image is split into multiple ciphered images by secret sharing. However, the MRDH-CI methods either fail to produce satisfied results, or only work well for conventional images. This paper introduces a multi-party reversible data-hiding approach over ciphered overexposed images. First, the pixels of the overexposed images are decomposed into two parts, each of which can be used for secret sharing. Then, the decomposed overexposed images are converted into multiple ciphered overexposed images by using a modified secret sharing method, in which the differences of the ciphered overexposed images are retained. The symmetry of the difference retaining makes the secret data conceal within the ciphered overexposed images such that the marked ciphered overexposed images can be created. Finally, by collecting sufficient marked ciphered overexposed images, it is possible to symmetrically reconstruct the concealed data and primitive overexposed image. Experimental results illustrate that the presented method can efficiently deal with overexposed images while maintaining a low computational overhead.<\/jats:p>","DOI":"10.3390\/sym16010045","type":"journal-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T06:18:13Z","timestamp":1703830693000},"page":"45","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the Design of Multi-Party Reversible Data Hiding over Ciphered Overexposed Images"],"prefix":"10.3390","volume":"16","author":[{"given":"Bing","family":"Chen","sequence":"first","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou 510665, China"}]},{"given":"Ranran","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou 510665, China"}]},{"given":"Wanhan","family":"Fang","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou 510665, China"}]},{"given":"Xiuye","family":"Zhan","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou 510665, China"}]},{"given":"Jun","family":"Cai","sequence":"additional","affiliation":[{"name":"School of Cyber Security, Guangdong Polytechnic Normal University, Guangzhou 510665, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,12,29]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"165838","DOI":"10.1016\/j.ijleo.2020.165838","article-title":"QR code based color image stego-crypto technique using dynamic bit replacement and logistic map","volume":"225","author":"Mathivanan","year":"2021","journal-title":"Optik"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"14945","DOI":"10.1007\/s11042-022-14072-8","article-title":"ECG steganography using Base64 encoding and pixel swapping technique","volume":"82","author":"Mathivanan","year":"2023","journal-title":"Multimed. Tools Appl."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1109\/LSP.2020.2965826","article-title":"A Secure and Privacy-Preserving Technique Based on Contrast-Enhancement Reversible Data Hiding and Plaintext Encryption for Medical Images","volume":"27","author":"Yang","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_4","first-page":"101804","article-title":"Color image reversible data hiding based on multi-channel synchronized histogram","volume":"35","author":"Peng","year":"2023","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"8738","DOI":"10.1109\/TMM.2023.3241541","article-title":"Reversible data hiding for JPEG images with adaptive multiple two-dimensional histogram and mapping generation","volume":"25","author":"Weng","year":"2023","journal-title":"IEEE Trans. Multimed."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"3623","DOI":"10.1007\/s11042-020-09341-3","article-title":"High capacity reversible and secured data hiding in images using interpolation and difference expansion technique","volume":"80","author":"Mandal","year":"2021","journal-title":"Multimed. Tools Appl."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"890","DOI":"10.1109\/TCSVT.2003.815962","article-title":"Reversible data embedding using a difference expansion","volume":"13","author":"Tian","year":"2003","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_8","first-page":"1395","article-title":"High fidelity based reversible data hiding using modified LSB matching and pixel difference","volume":"34","author":"Sahu","year":"2022","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"2300","DOI":"10.1109\/TCSVT.2019.2942489","article-title":"Optimal Reversible Data Hiding Scheme Based on Multiple Histograms Modification","volume":"30","author":"Qi","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1016\/j.ins.2020.10.063","article-title":"Reversible data hiding method for multi-histogram point selection based on improved crisscross optimization algorithm","volume":"549","author":"Weng","year":"2021","journal-title":"Inf. Sci."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"915","DOI":"10.1109\/LSP.2020.2996507","article-title":"Adaptive Complexity for Pixel-Value-Ordering Based Reversible Data Hiding","volume":"27","author":"Pan","year":"2020","journal-title":"IEEE Signal Process. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2306","DOI":"10.1109\/TIFS.2019.2963766","article-title":"Location-Based PVO and Adaptive Pairwise Modification for Efficient Reversible Data Hiding","volume":"15","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"5045","DOI":"10.1109\/TIP.2021.3078088","article-title":"Reversible Data Hiding Based on Dual Pairwise Prediction-Error Expansion","volume":"30","author":"He","year":"2021","journal-title":"IEEE Trans. Image Process."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"108527","DOI":"10.1016\/j.sigpro.2022.108527","article-title":"Reversible data hiding with pairwise PEE and 2D-PEH decomposition","volume":"196","author":"Yu","year":"2022","journal-title":"Signal Process."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/j.ins.2021.12.092","article-title":"Reversible data hiding based on high fidelity prediction scheme for reducing the number of invalid modifications","volume":"589","author":"Kouhi","year":"2022","journal-title":"Inf. Sci."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/TIFS.2020.3006382","article-title":"On the Security of Reversible Data Hiding in Encrypted Images by MSB Prediction","volume":"16","author":"Dragoi","year":"2021","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1288","DOI":"10.1109\/TMM.2021.3062699","article-title":"High Capacity Reversible Data Hiding in Encrypted Image Based on Adaptive MSB Prediction","volume":"24","author":"Wang","year":"2022","journal-title":"IEEE Trans. Multimed."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"103481","DOI":"10.1016\/j.jvcir.2022.103481","article-title":"High-capacity reversible data hiding in encrypted images based on adaptive block encoding","volume":"84","author":"Gao","year":"2022","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_19","doi-asserted-by":"crossref","unstructured":"Sui, L., Li, H., Liu, J., Xiao, Z., and Tian, A. (2023). Reversible Data Hiding in Encrypted Images Based on Hybrid Prediction and Huffman Coding. Symmetry, 15.","DOI":"10.3390\/sym15061222"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1109\/TCSVT.2018.2797897","article-title":"New Framework of Reversible Data Hiding in Encrypted JPEG Bitstreams","volume":"29","author":"Qian","year":"2019","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Ge, B., Ge, G., Xia, C., and Duan, X. (2023). High-Capacity Reversible Data Hiding in Encrypted Images Based on 2D-HS Chaotic System and Full Bit-Plane Searching. Symmetry, 15.","DOI":"10.3390\/sym15071423"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/j.jvcir.2019.04.015","article-title":"A high-capacity reversible data hiding method for homomorphic encrypted images","volume":"62","author":"Wu","year":"2019","journal-title":"J. Vis. Commun. Image Represent."},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"692","DOI":"10.1109\/TDSC.2019.2913422","article-title":"Lossless Data Hiding Based on Homomorphic Cryptosystem","volume":"18","author":"Zheng","year":"2021","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2353","DOI":"10.1109\/TCSVT.2019.2963393","article-title":"Fully Homomorphic Encryption Encapsulated Difference Expansion for Reversible Data Hiding in Encrypted Domain","volume":"30","author":"Ke","year":"2020","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_25","first-page":"978","article-title":"Secret Sharing Based Reversible Data Hiding in Encrypted Images With Multiple Data-Hiders","volume":"19","author":"Chen","year":"2022","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"4968","DOI":"10.1109\/TCSVT.2022.3140974","article-title":"Reversible Data Hiding in Encrypted Images Using Cipher-Feedback Secret Sharing","volume":"32","author":"Hua","year":"2022","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to Share a Secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_28","unstructured":"(2023, November 20). The Bossbase 1.01 Image Database, 2023. Available online: http:\/\/dde.binghamton.edu\/download\/."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/1\/45\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:43:58Z","timestamp":1760132638000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/16\/1\/45"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,29]]},"references-count":28,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2024,1]]}},"alternative-id":["sym16010045"],"URL":"https:\/\/doi.org\/10.3390\/sym16010045","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2023,12,29]]}}}