Next Article in Journal
Remote Sensing Image Change Detection Based on Deep Learning: Multi-Level Feature Cross-Fusion with 3D-Convolutional Neural Networks
Next Article in Special Issue
An Audio Watermarking Algorithm Based on Adversarial Perturbation
Previous Article in Journal
CellGAN: Generative Adversarial Networks for Cellular Microscopy Image Recognition with Integrated Feature Completion Mechanism
Previous Article in Special Issue
IW-NeRF: Using Implicit Watermarks to Protect the Copyright of Neural Radiation Fields
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Matrix-Based Secret Sharing

Key Laboratory of Network and Information Security of People’s Armed Police, Chinese People’s Armed Police Force Engineering University, Xi’an 710086, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2024, 14(14), 6267; https://doi.org/10.3390/app14146267
Submission received: 3 June 2024 / Revised: 13 July 2024 / Accepted: 17 July 2024 / Published: 18 July 2024
(This article belongs to the Special Issue Recent Advances in Multimedia Steganography and Watermarking)

Abstract

Reversible data hiding in encrypted images (RDH-EI) schemes based on secret sharing have emerged as a significant area of research in privacy protection. However, existing algorithms have limitations, such as low embedding capacity and insufficient privacy protection. To address these challenges, this paper proposes an RDH-EI scheme based on adaptive median edge detection (AMED) and matrix-based secret sharing (MSS). The algorithm creatively leverages the AMED technique for precise image prediction and then integrates the (r, n)-threshold MSS scheme to partition the image into n encrypted images. Simultaneously, it embeds identifying information during segmentation to detect potential attacks during transmission. The algorithm allows multiple data hiders to embed secret data independently. Experimental results demonstrate that the proposed algorithm significantly enhances the embedding rate while preserving reversibility compared to current algorithms. The average maximum embedding rates achieved are up to 5.8142 bits per pixel (bpp) for the (3, 4)-threshold scheme and up to 7.2713 bpp for the (6, 6)-threshold scheme. With disaster-resilient features, the algorithm ensures ( n r ) storage fault tolerance, enabling secure multi-party data storage. Furthermore, the design of the identifying information effectively evaluates the security of the transmission environment, making it suitable for multi-user cloud service scenarios.

1. Introduction

Advancements in cloud service technology and mobile communication terminals have led to an increased upload of multimedia data to cloud servers for storage via the Industrial Internet of Things (IIoT) [1]. This trend amplifies security risks concerning users’ private data. In response to this, the technology of reversible data hiding in encrypted images (RDH-EI) [2,3] has been developed to enhance data security in cloud environments, and facilitate the authentication and management of encrypted data. This technique allows for the embedding of secret data, such as check digits, into encrypted images while maintaining the privacy of the embedded secrets. Moreover, it enables receivers to fully recover the image and extract the secret data accurately.
The transmission of information in cloud service environments is intricate and diverse. Current RDH-EI algorithms are typically categorized based on their suitability for single-user or multi-user scenarios. Single-user-oriented algorithms fall under three main classes: vacating room after encryption (VRAE) [4,5], vacating room before encryption (VRBE) [6,7], and vacating room in encryption (VRIE) [8,9]. While most VRAE methods [10] employ lightweight ciphers to preserve pixel correlations when encrypting the carrier image, it has been shown that these ciphers, such as group substitution, are vulnerable under ciphertext-only attacks, as highlighted by Qu et al. [11]. To mitigate these vulnerabilities, some embedding algorithms based on homomorphic encryption [12,13] have been proposed. However, VRAE algorithms often face limitations in embedding capacity due to the high entropy of ciphertext state data. On the other hand, VRBE algorithms [14,15] directly utilize correlations between plaintext pixels to embed additional redundancy space. For instance, Wang et al. [16] employed Huffman coding to compress the most significant bits (MSBs) of image pixels, creating embeddable space and maintaining high-quality image recovery [17]. Zhang et al.’s algorithm [18] enhances embedding capacity through weighted prediction techniques, although it remains constrained by image texture features. Breaking through these limitations, VRIE algorithms, like that of Wu et al. [9], use random number substitution to embed secret data during the encryption process. While these algorithms enable covert communication, they are typically limited to single data hiders, falling short in meeting the multi-user data storage demands and thereby limiting their practicality in IIoT scenarios.
In 2020, Chen et al. introduced a hiding model based on secret sharing and multi-party embedding [19], distributing secret shares among various data hiders to achieve independent embedding. Zhao et al.’s algorithm adeptly conceals communication activities during multi-party data exchanges [20]. Xiong et al. [21] elaborated on the application of the RDH-EI algorithm in the context of the double-blind Inter Partes Review (IPR) scenario, as depicted in Figure 1a. The applicant entrusts the review committee with an encrypted image representing the patent file, which subsequently forwards the patent file and authorization data to each examiner. If the reviewer approves the patent, authorization data will be embedded into encrypted images to produce marked encrypted images. When the administrator extracts sufficient authorization data from the collected marked encrypted images, the patent passes the review. In 2022, Hua et al. [22] proposed an RDH-EI algorithm based on feedback secret sharing, enhancing the security of existing algorithms. Hua et al. [23] also proposed an RDH-EI scheme based on matrix-based secret sharing (MSS), enabling the complete restoration of the carrier image. In 2023, Yu et al. [24] proposed an RDH-EI scheme based on ciphertext sharing and hybrid coding to enhance embedding capacity. Hua et al. [25] also introduced a high-capacity RDH-EI scheme based on preprocessing-free secret sharing. However, secret sharing may reduce pixel correlation in the sub-secret image, resulting in wasted redundant space and potential security vulnerabilities. In cases of tampering during transmission, these algorithms may struggle to effectively detect such behavior due to the lack of a reference for confirmation, as both tampered and legitimate marked encrypted images appear visually indistinguishable as noisy images. This limitation compromises the ability to verify the authenticity of transmitted data in practical applications, posing security risks.
To address this issue, this paper proposes an RDH-EI algorithm based on adaptive median edge detection (AMED) and MSS secret sharing for distributed environments. Firstly, we introduce the innovative AMED pixel prediction technology, which achieves high prediction accuracy. Leveraging AMED technology and Huffman coding, we predict and recode the original image to generate the transitional image. Subsequently, using (r, n)-threshold MSS secret sharing in the G F ( 2 8 ) domain, the transitional image is fragmented into n encrypted images, with identifying information embedded. The encrypted images are then distributed to individual data hiders, who independently embed secret data to acquire n marked encrypted images. Upon collecting r marked encrypted images, the original image can be reconstructed using the corresponding key, and the embedded data can be extracted. Discrepancies in the embedded identifying information before and after embedding can reveal tampering attacks. The algorithm is illustrated in the context of the IPR scenario in Figure 1b. Experimental results indicate a marked improvement in the embedding capacity of the proposed algorithm compared to the current algorithms [5,14,21,22,23,24]. Furthermore, the algorithm also possesses resilience, allowing up to ( n r ) fault points to occur. Table 1 outlines the limitations of previous algorithms and the solutions provided by the algorithm presented in this paper.
The main contributions of this paper’s algorithm are as follows:
  • Introduction of the innovative AMED prediction technique, achieving superior prediction accuracy and surpassing the limitations of fixed predictors in existing MED techniques [15,26]. This enhancement significantly boosts the embedding capability of the algorithm.
  • This article introduces an RDH-EI algorithm based on AMED prediction and MSS secret sharing, innovatively executing image segmentation within the G F ( 2 8 ) domain. Compared to existing algorithms [23], the proposed method does not require additional data to store overflow pixels and avoids complex preprocessing, effectively reducing the usage of embedding space.
  • The creative design of identifying information effectively enhances the monitoring of the security of the transmission environment and ensures the authenticity of the data.
  • In comparison with existing algorithms, the algorithm proposed in this paper not only guarantees reversibility but also effectively increases embedding rates, thereby enhancing its practicality.
The subsequent sections of this paper unfold as follows: Section 2 elaborates on key technologies related to the algorithm, Section 3 specifies implementation details, Section 4 showcases experimental results and data analyses, and Section 5 concludes with a summary and outlook.

2. Key Technologies

2.1. MED Pixel Prediction

Pixel prediction techniques use known pixel values or contextual information to predict the value of a target pixel. When the predicted value closely matches the target pixel, it can be combined with coding strategies to achieve storage compression. This compression creates extra space that allows for the embedding of high-capacity secret data. Since its introduction by Li et al. [27], the MED predictor has been widely adopted in various data hiding algorithms due to its exceptional prediction accuracy [10,26]. In Figure 2, the MED predictor uses three neighboring pixel values around the target pixel x ( i , j ) to estimate its value, resulting in the predicted value p x ( i , j ) . The process of pixel prediction is detailed in the Equation (1).
p x ( i , j ) = max ( x ( i 1 , j ) , x ( i , j 1 ) )   ,   i f   x ( i 1 , j 1 ) min ( x ( i 1 , j ) , x ( i , j 1 ) ) min ( x ( i 1 , j ) , x ( i , j 1 ) )   ,   i f   x ( i 1 , j 1 ) max ( x ( i 1 , j ) , x ( i , j 1 ) ) x ( i 1 , j ) + x ( i , j 1 ) x ( i 1 , j 1 ) ,   o t h e r w i s e
In 2021, Wang et al. [10] introduced an RDH-EI algorithm that leverages this prediction technique, achieving an average embedding rate of 2.8764 bpp. Shirisha et al. [26] developed an RDH-EI scheme optimized for cloud service environments, combining the MED prediction technique with the logistic map’s sequence generation method to increase embedding capacity and ensure privacy protection during user information transmission, achieving a maximum embedding rate of 3.781 bpp. However, these algorithms typically identify embedding spaces based solely on local pixel correlation, without fully leveraging the distinct texture features of pixel blocks. To address this, the algorithm presented in this paper introduces the AMED prediction technique, incorporating adaptive parameters into the MED prediction method. This enhancement eliminates the limitations of fixed predictors, significantly improving pixel prediction accuracy and, consequently, the embedding rate of the RDH-EI scheme.

2.2. Matrix-Based Secret Sharing

In 2022, Hua et al. [23] introduced a secure ( r , n ) -threshold MSS scheme that leverages the invertibility of matrix operations and the uniqueness of their results. This scheme enhances secret sharing by incorporating a ciphertext feedback strategy, thereby significantly bolstering its security. Additionally, Hua et al. developed an RDH-EI scheme based on this secret sharing approach, which notably increased the embedding rate at that time. However, the scheme did not fully exploit the available redundant space during the encryption process. To optimize the utilization of this space, this paper employs the MSS technique to segment images in the domain G F (256) and embeds the identifying information during the segmentation process, consequently enhancing the algorithm’s security. The MSS scheme is constructed as follows:
Initially, an n × r matrix X is constructed so that the determinant of any n × r submatrix is coprime with F, following the outlined steps below:
  • Generate n random positive integers q 1 , q 2 , …, q n , each q k ( 1 k n ) being smaller than the prime F.
  • Produce n distinct positive integers p 1 , p 2 , …, p n , with each p k ( 1 k n ) also less than F.
  • Initialize an n × r matrix where the first column is filled with the n integers q k , and the elements of columns 2 through r are calculated using x ( i , j ) = x ( i , j 1 ) × ( p i + j 2 ) .
For partitioning the secret s, the sharing vector is constructed as a = [ s , a 1 , , a r 1 ] T , where a 1 , , a r 1 are (r – 2) randomly chosen values. If the secret being shared is the first in a set, a 1 can be any value; otherwise, a 1 is a randomly chosen sub-secret from the previous secret, to incorporate ciphertext feedback for enhanced security. Secret sharing is executed according to the following equation, resulting in a vector f = [ f 1 , f 2 , , f n ] T , which comprises n sub-secrets.
f = X × a m o d F
The i-th sub-secret can also be computed from the following equation:
f i = s × x i 1 + j = 2 r x i j a j 1   mod F
Here, x i j represents the j-th element of the i-th row of the coefficient matrix X.
We assume that the receiver P i holds the sub-secret ( I D i , f i ), where i is the identification serial number. When r shares ( I D 1 , f 1 ), ( I D 2 , f 2 ), , ( I D r , f r ) are collected, the first step involves generating the n × r coefficient matrix X. Then, the 1st, 2nd, …, r-th rows of matrix X are selected to construct the matrix Xr. The det(Xr) and F are mutually prime. The secret s can be obtained by the following equation:
a = X r 1 × f ( r ) mod F
Here, f ( r ) = [ f 1 , f 2 , , f r ] T represents a reconstructed vector of r sub-secrets. The first element of vector a is extracted to retrieve the secret s. In the context of an ( r , n ) -threshold MSS, any party with fewer than r sub-secrets cannot extract valid information, underscoring the algorithm’s robust tolerance and heightened security. The algorithm’s resilience and security are fortified by introducing random parameters during the encryption process for data embedding via data replacement. This embedding mechanism is incorporated into the proposed algorithm, augmenting its disaster resistance and enabling secure distributed data storage in cloud service environments.

3. The Proposed Method

This study proposes an RDH-EI algorithm with a substantial embedding capacity, leveraging the correlation between image pixels and the encryption features of MSS. The algorithm’s framework is illustrated in Figure 3. Initially, the image owner preprocesses the original image I using the AMED pixel prediction technique, resulting in the transitional image IR. Subsequently, the image is shared using an ( r , n ) -threshold MSS, with the concurrent embedding of identifying information. Subsequent to this stage, the resulting n encrypted images IE k are distributed to individual data hiders for autonomous embedding, yielding n marked encrypted images IM k . The recipient can leverage the key to extract the embedded secret data from each marked encrypted image individually or fully reconstruct the image to accurately extract both the secret data and identifying information by collecting any r marked encrypted images. Additionally, the recipient can detect tampering attempts in the transmission environment by comparing the identifying information pre- and post-embedding. The algorithm further utilizes the threshold characteristic of secret sharing to enhance data disaster resistance, accommodating up to ( n r ) failure points.

3.1. AMED Prediction and Recoding

3.1.1. Block-Level Pixel Prediction

To enhance the embedding capacity by leveraging pixel correlation, we employ direct pixel prediction on plaintext images. Initially, the carrier image I with dimensions M × N is partitioned into pixel blocks of size B × B , where B 3 , resulting in B M × B N blocks. The block sizes BM and BN are determined by the following equation:
B M = M ÷ B B N = N ÷ B
To predict all pixels after block segmentation, we extend the pixel blocks as follows, so that edge pixels of the blocks also have reference pixels:
  • When the pixel block contains the image pixel x ( 1 , 1 ) , the block is not expanded.
  • When the pixel block does not contain the image pixel x ( 1 , 1 ) but contains the pixel x ( 1 , j 0 ) with j 0 > 1 , we add a column of random pixels to the left side of the pixel block, expanding it to a pixel block of size B × ( B + 1 ) .
  • When the pixel block does not contain the image pixel x ( 1 , 1 ) but contains the pixel x ( i 0 , 1 ) with i 0 > 1 , we add a row of random pixels on top of the pixel block, expanding it to a pixel block of size ( B + 1 ) × B .
  • Other cases: We add a column and a row of random pixels to the left and above the remaining pixel block, respectively, expanding it to a pixel block of size ( B + 1 ) × ( B + 1 ) .
The target pixel x ( i , j ) in the z-th pixel chunk is predicted using the AMED predictor to obtain the predicted value p x ( i , j ) , as shown in Equation (6). Initially, the adaptive parameters p 1 , p 2 , and p 3 are determined, with their experimental values set to p 1 = 0 , p 2 = 0 , and p 3 = 0 . These adaptive parameters remain constant when predicting pixels within the same pixel chunk.
p x ( i , j ) = max ( x ( i 1 , j ) , x ( i , j 1 ) ) + p 1   ,   i f   x ( i 1 , j 1 ) min ( x ( i 1 , j ) , x ( i , j 1 ) ) min ( x ( i 1 , j ) , x ( i , j 1 ) ) + p 2   ,   i f   x ( i 1 , j 1 ) max ( x ( i 1 , j ) , x ( i , j 1 ) ) x ( i 1 , j ) + x ( i , j 1 ) x ( i 1 , j 1 ) + p 3 ,   o t h e r w i s e
The pixel value x ( i , j ) is converted into an eight-bit binary string:
x k ( i , j ) = mod ( x ( i , j ) , 2 9 k ) 2 8 k , k = 1 , 2 , , 8
Here, x k ( i , j ) represents the value in the k-th bit plane, progressing from the highest bit, with x k ( i , j ) 0 , 1 . Similarly, transforming the predicted pixel value yields p x k ( i , j ) , where k = 1, 2, …, 8. We compare x k ( i , j ) to p x k ( i , j ) bit by bit, starting from the most significant bit (MSB), to determine the number of consecutive identical bits and assign this as the label value w ( i , j ) until a discrepancy is detected. The label value w ( i , j ) ranges from 0 to 8, inclusive, where w ( i , j ) = 0 indicates x k ( i , j ) p x k ( i , j ) ; w ( i , j ) = 8 indicates x ( i , j ) = p x ( i , j ) . For instance, considering the target pixel x ( i , j ) = 162 and the predicted value p x ( i , j ) = 167 . Comparing them reveals that the first five bits are identical, while the sixth bit differs, leading to a labeled value of w equal to 5. This process is illustrated in Figure 4:
AMED prediction is applied to all pixels within the pixel block, excluding those in the initial row and column, resulting in a total of ( B 1 ) 2 tagged values and forming the tag map for the pixel block.

3.1.2. Calculating the Load Capacity for Secret Data of Pixel Blocks

We utilize Huffman coding to compress the labeled value w. There are nine potential values of w, thus necessitating nine distinct Huffman codes to represent these variations. Specifically, the codes 00, 01, 100, 101, 1100, 1101, 1110, 11110, 11111 are assigned to represent the nine encodings. The frequency of each label value within the pixel block is calculated, allowing for the use of shorter codes for labels with higher occurrence probabilities and longer codes for those with lower probabilities. Consequently, “0” is assigned to the label with the highest frequency, while “11111” corresponds to the least frequent label. For example, in a 64 × 64 pixel block of a MAN image, following the successful prediction of pixel values, each pixel’s label is determined and encoded using Huffman coding. The statistical results illustrating the frequency distribution of label values within the block are provided in Table 2 below.
Taking label w = 5 as an illustration, based on the predicted pixel, we can deduce the highest six bits of the target pixel, enabling the substitution of these six bits with secret data for embedding. However, it remains imperative to record the label w utilizing the encoding “01”. Thus, for a solitary pixel possessing a label value of 5, its capacity to accommodate payload information can be expressed as l o a d ( i , j ) = 5 + 1 2 = 4 . The load capacity of all pixels is computed according to Equation (8), yielding the data in column 6 of Table 2.
l o a d ( i , j ) = w + 1 l o n g ( c o d e ( x ( i , j ) ) ) , w 8 w l o n g ( c o d e ( x ( i , j ) ) ) , w = 8
Next, the load capacity of all pixels within the pixel block, excluding the first row and the first column, is computed to determine the pixel block’s load capacity, denoted as l o a d ( z ) .
During the pixel prediction process, with the adaptive parameters fixed as p 1 = p 10 , p 2 = p 20 , and p 3 = p 30 , the load capacity of the pixel block, represented as l o a d p 10 , p 20 , p 30 ( z ) , is determined. The optimal parameter combination is identified through adaptive training. By traversing through all feasible values of p 1 , p 2 , and p 3 , where the parameter values are constrained to integers from −3 to 4 (i.e., p i Z , 3 p i 4 , resulting in a total of 24 potential combinations for the adaptive parameters p 1 , p 2 , and p 3 (i.e., 3 × 8 = 24 possibilities). Consequently, there are 24 distinct values of l o a d p 1 , p 2 , p 3 ( z ) for a pixel. Once these data reach their maximum value, the corresponding adaptive parameters are recorded as p 1 = p 1 n , p 2 = p 2 n , and p 3 = p 3 n . At this stage, the accuracy of the AMED median predictor is optimized, thereby maximizing the loading capacity of the image pixel block. The label value w ( i , j ) is then designated as the final label for the pixels within the pixel block.
The method described above is applied to dynamically predict each pixel block of the original image, resulting in the derivation of labels for all pixels in the original image except those in the first row and column. This dataset is referred to as W. Subsequently, we document the optimal adaptive parameters that maximize the loading capacity.

3.1.3. Recoding

Initially, 3 bits are allocated to record the chunk size B. In the experiments outlined in this paper, B takes on values of 512, 256, 128, 64, and 32, which will be thoroughly elaborated on in the experimental section. Following this, 32 × B N × B M bits are utilized to document the adaptive parameter ARP for all pixel blocks within the image, 32 bits are utilized to to record the Huffman coding rule (HCR). We convert W into a binary sequence WS, allocating an additional 22 bits to record the length of WS as W L . Finally, we concatenate W L , B, ARP, HCR, and WS in sequence with the pixel values of the first row and the first column of the original image to generate an edge information object identified as O.
Moving forward, we now proceed to integrate the edge information. Initially, we replace the pixel values of the first row and first column of the encrypted image with the first 8 ( M × N 1 ) bits of the edge information O. Subsequently, leveraging the pixel label as a reference, we embed the remaining edge information into the encrypted image through bit substitution. This embedding takes place within the highest ( w + 1 ) MSB of the unreplaced pixels in the encrypted image. The embedding formula is detailed as follows:
x e ( i , j ) = x e ( i , j ) mod 2 7 w + l = 0 w ( s l × 2 7 l ) ,   0 w 6 l = 1 8 ( s l × 2 8 l ) ,   7 w 8
The pixel value post-information embedding is represented as x e ( i , j ) , where s l denotes the auxiliary information that can be embedded into the current pixel, and l signifies the load capacity of a single pixel. Following the embedding of all edge information, random noise is generated and embedded into the remaining positions post-edge information, as described in Equation (9), resulting in the transitional image denoted as IR.

3.2. Image Sharing and Identifying Information Embedding

In this study, the algorithm opts for q = 2 8 to establish a finite field for executing secret sharing of the image within the domain. The image is divided into three parts: part A contains pixels with data WL, part B holds the remaining edge information, and part C encompasses the other pixels. For part B, a ( r , n ) -threshold secret sharing scheme is exclusively employed. Initially, a sequence of coefficient matrices Xs = X 1 , X 2 , , X L B is generated based on the key K p , where LB represents the number of pixels in part B. For segmenting pixel values IR ( i , j ) and embedding identifying information, 8( r 1 ) bits of data are extracted from the identifying information md = 0 , 1 N . After encryption with the identifying information hiding key K d , every 8 bits are converted into decimal numbers, resulting in the sequence ms = m s 1 , m s 2 , , m s r 1 .
Then, the sharing vector a i j = [ IR ( i , j ) , a 1 ( i , j ) , , a r 1 ( i , j ) ] T is constructed, and the mapping e i j : ( i , j ) f k ( i , j ) is generated by the key K p , where f k ( i , j ) is the sub-secret of the previous pixel of pixel IR ( i , j ) , k is the position index of the sub-secret in the vector f, k 1 , 2 , , n . When IR ( i , j ) is the first pixel in part B, f k ( i , j ) is a random value. Calculate a 1 ( i , j ) with a 2 ( i , j ) , a 3 ( i , j ) , , a r 1 ( i , j ) , h 1 , 2 , , r 1 from the following equation:
a 1 ( i , j ) = f k ( i , j ) + m s 1 a h ( i , j ) = m s h
Determine X k , k 1 , 2 , , L B in the generated sequence of Xs from the positional ordinal number of pixel IR ( i , j ) in the pixel of part B. Finally, we perform secret sharing according to the equation, and embed ms:
f 1 ( i , j ) f 2 ( i , j ) f n ( i , j ) = x 11 x 12 x 1 r x 21 x 22 x 2 r x n 1 x n 2 x n r × IR ( i , j ) a 1 ( i , j ) a r 1 ( i , j ) mod q
Once all pixel values in part B have been shared, f k ( i , j ) of the same identity k are aggregated to obtain n sub-secrets B k of part B. These are then combined with parts A and C to generate n encrypted images IE k , which are distributed by the image owner to n data hiders.

3.3. Secret Data Hiding

As a data hider I D i , the secret data m i = 0 , 1 N is first encrypted using the data hiding key K i to produce the encrypted data m i = 0 , 1 N . Subsequently, the partial edge information can be extracted from the first row and column of the encrypted image, containing parameters such as W L , B, ARP, HCR with the partial WS. By converting pixel values to 8-bit binary according to Equation (7), based on the partial WS, and referencing the HCR, the labeled values of the partial pixels can be determined, indicating the embedding positions of these pixels, specifically the high ( w + 1 ) bits of the pixel values. By iteratively extracting and processing the edge information, all embedded edge information can be obtained.
Then we divide the image IE k into part A, part B k , and part C, and replace the pixel values of part C with m i to complete the embedding operation to obtain the embedded image IA k , and then we perform the double encryption of scrambling encryption and XOR encryption to further improve the security of the embedded image. We first divide the image IA k into pixel blocks of size B × B , use the key K i to generate a random number sequence, and then sort the random number sequence to obtain the index vector of the pixel blocks. Finally, the image blocks are scrambled according to the index vector to obtain the image IE k . Then, we perform XOR encryption on the image: generate an M × N random matrix P k according to the key K i , and encrypt the image IE k according to the following equation, finally obtaining marked encrypted images IM k :
IM k ( i , j ) = P k ( i , j ) IE   k ( i , j )
The operation denoted by ⊕ corresponds to modulo 256 addition, with i , j representing the position index where 1 < i M , 1 < j N .

3.4. Data Extraction and Image Recovery

Based on the possession of specific keys, the receiver can extract secret data from any marked encrypted image, or extract identifying data from r marked encrypted images and reconstruct the original image.

3.4.1. Secret Data Extraction

In the role of the recipient, the initial step involves employing the key K s i to perform inverse scrambling and XOR decryption on the marked encrypted image IM k , resulting in the recovery of the image IA k . Subsequently, the receiver implements analogous procedures to those used during the secret data embedding phase to extract both the edge information O and the encrypted data m i . Finally, decryption of m i is carried out with the key K s i to unveil the secret data m i .

3.4.2. Image Recovery

The recipient independently conducts the aforementioned procedures on each of the r-marked encrypted images to isolate the portion B k from the images.
The identifiers for the data hiders are denoted as i 1 , i 2 , , i r , respectively. Utilizing the key K p , we generate Xs = X 1 , X 2 , , X L B , and then select the i 1 , i 2 , , i r rows from the coefficient matrix X i to form the matrix Xr i . The inverse matrix Xr i 1 is then calculated using the following equation:
Xr i 1 = Xr i * det ( Xr i )   mod 256
where Xr i * represents the accompanying matrix of Xr i . Next, we utilize the B k part of the r embedded images IA k to decrypt and restore pixel IR ( i , j ) . Assuming pixels f 1 ( i , j ) , f 2 ( i , j ) , , f r ( i , j ) are utilized for decryption, IR ( i , j ) is obtained from the Equation (14):
IR ( i , j ) a 1 ( i , j ) a r 1 ( i , j ) = Xr i 1 × f 1 ( i , j ) f 2 ( i , j ) f r ( i , j )   mod 256
We conduct the recovery operation on all pixels to obtain the transitional image IR. Subsequently, we replace the corresponding pixel values in image IR with the first row and column pixels of the original image found in the edge information O. The adaptive parameters p 1 , p 2 , and p 3 corresponding to pixel x ( i , j ) can be obtained from the ARP in O. Starting from pixel IR ( 2 , 2 ) , the AMED prediction is performed on pixel x ( i , j ) in the order of top-to-bottom and left-to-right, and the predicted value p x ( i , j ) can be obtained. From the pixel label value w in the edge information, the load capacity l o a d ( z ) of the pixel can be obtained so that we can recover the pixel value of the original image because the predicted pixel is the same as the original pixel with the high w bits, and the ( w + 1 ) -th MSB is inverted. The recovery process unfolds in the following manner:
x ( i , j ) = p x ( i , j ) 2 8 w × 2 8 w + b w + 1 × 2 7 w + x ( i , j ) mod 2 7 w , i f 0 w 7   p x ( i , j ) , i f w = 8
where b w + 1 is the ( w + 1 ) -th MSB flip value of the predicted pixel p x ( i , j ) as shown in the following equation:
b w + 1 = 0   ,   p x w + 1 ( i , j ) = 1 1   ,   p x w + 1 ( i , j ) = 0
Upon the successful recovery of all pixels, the original image I can be obtained.

3.4.3. Identifying Information Extraction

To illustrate the extraction process of the identifying information embedded in the transitional image pixel IR ( i , j ) , consider the extraction of IR ( i , j ) , a 1 ( i , j ) , , a r 1 ( i , j ) as per Equation (14). Subsequently, the key K p defines the mapping e i j , enabling the derivation of f k ( i , j ) from a 1 ( i , j ) . By following the procedure outlined in Equation (17), the encrypted identifying information m 1 can be obtained:
m s 1 = a 1 ( i , j ) f k ( i , j )
Following this, the application of Equation (10) enables the computation of m s 2 , …, m s r 1 . Subsequently, decrypting the data using the key K d reveals part of the identifying information md. This operation is repeated to extract all the identifying information, and it is compared with the md prior to embedding. Consistency denotes a secure transmission environment, whereas discrepancies point towards a potential data tampering attack during data transmission.
The receiver can independently perform secret data extraction, image recovery, and identifying information extraction based on possessing the key. These operations can be conducted separately.

4. Experiments and Analysis of Results

For the assessment of the algorithm’s efficacy and to highlight its advancements over current methodologies, a total of 21,338 8-bit grayscale images were selected from three image datasets: BOSSBase [28], BOWS-2 [29], and UCID [30], for testing and comparison in experiments. The primary set of six test images utilized in these experiments are presented in Figure 5. The evaluation of the algorithm’s performance in this research focuses on four crucial aspects: reversibility, data embedding efficiency, data expansion, and security.
The experimental setup utilized an Intel® Core™ i5-9300H CPU (Lenovo, Beijing, China) operating at 2.40 GHz, equipped with 8 GB of memory, running on the Windows 11 platform, and utilizing the MATLAB R2021b simulation environment.

4.1. Reversibility

In this study, we implemented the proposed algorithm, based on the (3, 4)-threshold, to conduct embedding simulation experiments using the Jetplane image. Figure 6 illustrates images generated at different stages of the experiments. The sequence begins with the original image shown in Figure 6a, followed by the transitional image post-pixel prediction and encoding in Figure 6b. Figure 6c–f display the marked encrypted images produced after embedding random data, from which human eyes cannot discern any identifiable information about the secret data or the original image. Figure 6g visualizes the recovered image.
To ascertain whether the recovered image exhibits significant distortion, we utilize the peak signal-to-noise ratio (PSNR) as a comparative metric between the recovered image and the original image, measuring the reversibility of the algorithm. Typically, when the PSNR approaches infinity, the original image is considered fully recovered. The PSNR is calculated using the following equation:
PSNR = 10 × log 10 ( 2 k 1 ) 2 M S E
where 4 is the image pixel depth and MSE is the mean square error, which can be derived from the following equation:
M S E = 1 M × N i = 0 M 1 j = 0 N 1 T i , j T   i , j 2
where M and N denote the image size, T i j and T i j are the pixels of the original image and the pixels of the recovered image, respectively.
Figure 7 shows a comparison of the rate distortion curves of the algorithms on the Lena image. The algorithm developed by Sahu et al. [5] sustains a stable PSNR of approximately 40 dB during image recovery. The algorithm by Datta et al. [7] employs matrix encoding for embedding, resulting in distortion during image recovery, with an average PSNR of 72.52 dB. Additionally, the algorithm by Kamil et al. [14] achieves a PSNR of 58.7 dB at an embedding rate of 1 bpp. The algorithm by Zhang et al. [18] discards certain data regarding the original image during encoding and embedding, which leads to image distortion. Similarly, the approach by Xiong et al. [21] experiences difficulty in fully recovering the original pixel due to bit flipping, causing image distortion. In contrast, the algorithm presented in this paper is tested in Matlab simulation experiments, and the PSNRs obtained are all with full reversibility. In the theoretical derivation, Equations (11) and (14) are inverse operations to each other, which ensures that the extracted pixel IR ( i , j ) has the same value as before encryption, and the process of encoding the original image I into the transitional image IR is reversible, so that the recovered image is the same as the original image. The algorithm in this study achieves lossless image recovery and outperforms existing methodologies.

4.2. Data Embedding Performance

The embedding rate (ER) serves as a critical metric for gauging the effectiveness of an information hiding algorithm, quantifying the average amount of information embeddable per pixel in an image. The embedding rate can be calculated as follows:
ER = Total number of embedded bits Total number of pixels of the encrypted image
We can theoretically calculate the ER of the algorithm proposed in this paper:
ER = 8 ( r 1 ) ( M N 3 ) + 8 ( 1 r + n ) L o a d L o a d 8 8 n M N
where L o a d represents the total load capacity of the intermediate image, higher pixel prediction accuracy corresponds to a greater L o a d value. It is evident that with other parameters unchanged, as the image size M N increases, ER also increases. In practice, as the image size grows, the L o a d value also increases, thereby increasing ER further. Additionally, the threshold values ( r , n ) will cause nonlinear effects on ER depending on the actual sizes of other parameters.
Upon receiving the encrypted image, the information hider embeds the secret data by replacing bits in the image’s noisy regions. The quantity of embedded information correlates with the load capacity value of the intermediate image. Table 3 presents the load capacities for various images when B = 64 . The load capacity for an image is not merely the sum of the pixel blocks’ load capacities, as additional space is required to store edge information, ensuring the algorithm’s ability to fully recover the original image. As seen in Table 3, the load capacity varies across images due to their distinct texture features. By employing the (3, 4)-threshold algorithm proposed in this paper for image embedding, it is clear that the algorithm demonstrates varying ERs across different images.
To assess the universality of the embedding capabilities of the algorithms proposed in this paper, we selected 10,000 grayscale images of size 512 × 512 from each of the BOSSBase and BOWS-2 databases, along with 1338 grayscale images of sizes 512 × 384 or 384 × 512 from the UCID database. These images were used to embed randomly generated information. According to the experimental findings presented in Table 4, the minimum embedding rate of the algorithm for the (3, 4) threshold-exceeds 4 bpp, and the average embedding rate is over 5.5 bpp across all databases. For the (6, 6)-threshold, the minimum embedding rate exceeds 6.5 bpp, with an average rate over 7 bpp. Furthermore, the PSNRs for the algorithm are infinite, ensuring reversibility. The performance of the algorithms, in terms of embedding rates across the three image databases, is illustrated in Figure 8.
Next, we delve into the impact of the threshold values in secret sharing on the image embedding rate. Table 5 illustrates the comparative embedding rates of our algorithm in embedding experiments on Man image under different parameters. The experimental findings reveal that with a constant threshold value, smaller block sizes result in higher embedding rates. This phenomenon arises because the AMED prediction relies on texture features from different blocks; thus, the smaller the block size, the higher the prediction accuracy. Moreover, when the block size remains constant, holding an equal r value, lower n values correspond to higher embedding rates, and when n values remain the same, higher r values lead to higher embedding rates. The maximum embedding rate achieved by our algorithm in this experiment reaches up to 7.5330 bpp. In practical applications, it is essential to align the r and n values of the algorithm as closely as possible to ensure both resilience and a high embedding rate.
In order to demonstrate the superior embedding rate capabilities of our algorithm, we conducted experiments using six widely recognized images: Airplane, Baboon, Lena, Jetplane, Man, and Tiffany. The results, depicted in Figure 9, compare the highest embedding rate achieved by our algorithm with those of existing algorithms. Sahu et al. [5]’s algorithm utilized LSB matching for embedding, achieving a modest embedding rate of 2 bpp. Kamil et al. [14]’s algorithm attained an average embedding rate of 0.90 bpp, primarily due to less advanced compression technologies. Xiong et al. [21]’s algorithm encoded pixels into multiple Hamming code words and leveraged error correction capabilities, reaching embedding rates of up to 3 bpp. In the experiments, our algorithm excelled with a maximum embedding rate of 7.11 bpp, doubling the rate of Xiong et al. [21]’s approach. While algorithms in references [22,23] both utilized image correlation embedding post secret sharing, their embedding rates are constrained by coding techniques. Yu et al. [24] improved upon this by employing a hybrid coding technique, achieving an average embedding rate of up to 3.20 bpp with a (3, 4) threshold. Our algorithm, using the same threshold values, surpasses Yu et al.’s by approximately 2.12 bpp. Notably, our algorithm based on (6, 6)-threshold achieves an average embedding rate exceeding 7 bpp across these six images, significantly outperforming existing algorithms. This marked advancement positions our algorithm as a more practical solution, capable of embedding significantly larger volumes of data within images.

4.3. Data Expansion

We use the data expansion rate to measure the resources occupied by marked encrypted images, which is expressed as the ratio of ciphertext data volume to original image data volume. Based on the embedding operation phase, our algorithm belongs to the category of VRIE and VRAE. We compare our algorithm with existing ones. Experimental results are shown in Table 6. An exemplary algorithm by Kamil et al. [14] achieves embedding via histogram shifting, categorized as a VRBE algorithm, with the resulting marked encrypted images retaining the size of the original images. Conversely, Ke et al.’s algorithm [12] leverages homomorphic encryption schemes, achieving a notable data expansion rate of up to 256, with limited practical utility. The algorithm proposed in references [21,23,24] and the algorithm presented in this paper both perform embedding operations on sub-secret images, with the total ciphertext data volume being the number of shares n. However, for each distributed storage, the data expansion rate is 1. Our algorithm embeds identifying information during secret sharing and embeds the user’s secret data after encryption through bit replacement, with neither embedding process altering the image size; the only data expansion occurs during secret sharing. While our algorithm and existing RDH-EI algorithms share comparable data expansion rates, ours excels in image recovery quality and embedding rates, thereby delivering superior performance.

4.4. Security

4.4.1. Computational Complexity

Computational complexity denotes the computational workload needed to execute an algorithm and serves as a pivotal metric for assessing performance. Presently, stream ciphers and public key cryptography algorithms are prevalent in the RDH-EI algorithm domain. Table 7 displays the computational complexity of executing the algorithm across various encryption methodologies.
AES encryption and decryption of a pixel exhibit a computational complexity of O ( 1 ) . When considering a private key length of r, the computational complexities for encrypting and decrypting a pixel using LWE and Paillier encryption methods are O ( r 2 ) and O ( r 3 ) , respectively. Employing ( k , n ) -threshold secret sharing encryption for a pixel results in a computational complexity of O ( n ) for encryption and O ( n log 2 n ) for decryption, as rigorously proven by Shamir et al. [31].
In our algorithm, the computational complexity of AMED prediction and re-encoding operations is O ( 1 ) . During the secret splitting process, data embedding occurs by establishing a mapping relationship between secret data and vector parameters, maintaining a computational complexity of O ( n ) . Information extraction involves recovering non-leading parameters of the shared vector; Hua et al. [23] proposed a recursive algorithm with a computational complexity of O ( k 2 log 2 k ) . For image recovery, only the leading parameter of the shared vector is necessary, mirroring the process in MSS secret sharing, showcasing a computational complexity of O ( k log 2 k ) .

4.4.2. Extraction Correctness

The legitimate receiver can successfully extract the encrypted secret data m i from the marked encrypted image using the authorized key K s i , while an attacker remains unable to extract the secret data accurately.
Assuming an attacker attempts to decrypt m i using a forged key, the extracted secret is compared bit by bit with m i . If they match, it is marked as 0; otherwise, it is marked as 1. Experimental results in Figure 10a show that occurrences of 1 and 0 have equal probabilities of 0.5 and are entirely independent. When the receiver uses the data hiding key K s i for decryption and extraction, the extracted data match the pre-embedding data, demonstrated in Figure 10b. This underscores that without K s i , attackers cannot extract valid information from the marked encrypted image, thus fortifying the algorithm against unauthorized access. Only with a valid key can the receiver accurately retrieve the secret data. If an attacker tampers with a marked encrypted image, the algorithm detects such alterations by comparing identifying information before and after embedding. When the algorithm’s threshold is set to (3, 4), we forge a random image and perform identifying information extraction alongside any two legitimate marked encrypted images. Subsequently, we compare the extracted data with the pre-embedding identifying information from each image. The result, as shown in Figure 10c, reveals significant differences, indicating the receiver’s inability to extract correct identifying information. Choosing any three marked encrypted images for decryption, the experiment demonstrates that the extracted identifying information aligns with the pre-embedding identifying information, as depicted in Figure 10d. When an attack takes place during the transmission of encrypted images from the image owner to the data hider, we manipulate any encrypted image to replicate this process, and involve this image in the subsequent process of embedding and extracting secret data. By analyzing identifying information, we can determine the occurrence of the attack, as illustrated in Figure 10e. Conversely, when no attack is present, the experimental results are depicted in Figure 10f. This suggests that the algorithm can effectively detect potential malicious activities in the transmission environment using identifying information, thus verifying the authenticity of the data.
Due to the threshold nature of the described algorithm, the successful extraction of secret data requires multiple users to simultaneously provide the decryption keys needed. However, managing multiple users can introduce significant complexity, potentially leading to conflicts such as resource contention from concurrent decryption attempts. To address this challenge, we conducted experiments with existing distributed locks, and through comparison, found that Redisson distributed lock can effectively handle concurrent access among multiple users while minimizing related complexities [32]. Table 8 presents the experimental results, showcasing that Redisson distributed lock offers benefits such as fast response times, simplicity of operation, and support for fine-grained lock control, making it better-suited for serving multiple users in the RDH-EI algorithm. The implementation of Redisson distributed lock involves locking the system during secret data extraction operations. We employed the (3, 4)-threshold algorithm in this paper to embed random data into large images, followed by simultaneously having two groups of users apply for system occupation and locking. We designated the thread that first occupies the system as Thread A and the unsuccessful one as Thread B. We set time points to observe the behavior of Thread B, and the results are shown in Table 9.
When Thread A successfully occupies the system and locks it, the system sets the leaseTime to 30 s and activates a watchDog that renews the lock every 10 s to maintain a timeout of 30 s. Meanwhile, Thread B fails to lock and subscribes to listen for release notifications of the lock. When the system lock is released, a broadcast message is sent out. As Thread A occupies the system for 10 and 20 s, the watchDog extends the lock duration to 30 s, while Thread B continues to listen. Around the 50 s mark, when Thread A completes its operation and releases the lock, Thread B receives the broadcast, attempts to acquire the lock, succeeds, and starts its operation, with the watchDog also kicking in. Experimental results demonstrate that Redisson distributed lock effectively resolves coordination issues among multiple users.

4.4.3. Uncertainty

To prevent attackers from retrieving accurate information from the marked encrypted image, it is imperative that the digital attributes of the image align closely with those of a randomly generated noise image. This has been empirically examined from three distinct perspectives: pixel distribution, correlation, and information entropy. We embed randomly generated identifying information and secret data into the Man image using our algorithm based on a (3, 3) threshold. Figure 11 demonstrates the pixel distribution in the correlation image, indicating that the pixel values are uniformly distributed in both the encrypted image and the marked encrypted images.
Next, we leverage the security of the pixel correlation analysis algorithm. We randomly select 26,000 pairs of adjacent pixels in the original image and the marked encrypted image with embedded secret data, analyzing the correlation coefficients in three directions: horizontal, vertical, and diagonal. The formula below represents the correlation coefficient r x y .
r x y = cov ( x , y ) D ( x ) D ( y ) D ( x ) = 1 N 1 i = 1 N ( x i E ( x ) ) 2 D ( y ) = 1 N 1 i = 1 N ( y i E ( y ) ) 2 cov ( x , y ) = 1 N 1 i = 1 N ( x i E ( x ) ) ( y i E ( y ) ) E ( x ) = 1 N i = 1 N x i , E ( y ) = 1 N i = 1 N y i
where x and y represent the values of the paired neighboring pixels in the test image.
Table 10 presents the correlation coefficient test results for the Man image. These results reveal that the correlation coefficients of the original image demonstrate strong correlations in various directions, with an average value of 0.9540, nearing 1. In contrast, the correlation coefficients of the marked encrypted images approach 0 in different directions, indicating a significant reduction in correlation. Figure 12 displays the scatter plot of the correlation coefficients for both the original and the marked encrypted images. It is observed that most samples from the original image cluster around the line y = x , indicating a strong correlation. Meanwhile, the scatter plots for the marked encrypted images show a uniform distribution, aligning with the mathematical statistical characteristics of random grayscale images. This outcome results from the algorithm’s process of embedding secret data into the image, disrupting its pixel correlation, and subsequently performing XOR encryption on the encrypted images, further diminishing the pixel correlation coefficient to nearly zero.
In practical application scenarios, algorithms often face unknown attacks. Therefore, we use Spearman’s rank correlation coefficient (SRCC) and Kendall rank correlation coefficient (KRCC) [38] to test the monotonicity of images, further assessing whether attackers can extract information about the original images. Experimental results are shown in Table 11, where [38] indicates the following: when SRCC and KRCC are close to 1 or −1, there is a high correlation between images, while values close to 0 indicate low correlation. In our algorithm, both the SRCC and KRCC values of the marked encrypted images IM i are close to 0. This can be attributed to the encrypted secret data displaying pseudo-random characteristics before embedding, while the algorithm maintains the ciphertext feedback properties of the MSS secret sharing scheme, along with certain scalability attributes. As a result, our algorithm demonstrates robust security.
The information entropy of an image represents the balance in the occurrence frequency of each grayscale level of its pixels. A higher information entropy value indicates a greater amount of information contained in the image and better defense against statistically based attacks. The information entropy is calculated using the following equation:
H = i = 1 N Pr ( σ i ) log Pr ( σ i )
where N represents the number of pixel values, σ i denotes the i-th pixel value, and Pr ( σ i ) signifies the probability of the i-th pixel value occurring.
For a grayscale image with an 8-bit depth, where the pixel values σ i range from 1 to 255, the information entropy reaches its peak when the probability Pr ( σ i ) equals 1/256, resulting in a maximum entropy value of 8. In our experiment, we assessed the information entropy of the pertinent images, with the results detailed in Table 12. The average information entropy of the marked encrypted images was determined to be 7.9914, closely approaching the theoretical maximum of 8, indicating a uniform distribution of pixel values. This algorithm effectively shields the image and secret data from statistic-based attacks, demonstrating robust security.

4.4.4. Differential Attack

To evaluate the resistance of the proposed algorithm against differential attacks, we employ the metrics of the number of pixel change rate (NPCR) and the uniform average change intensity (UACI) [39]. NPCR quantifies the rate of pixel modifications observed at corresponding locations between the original and encrypted images; a value closer to 100% signifies greater discrepancies between the images, reflecting a higher level of security for the algorithm. On the other hand, UACI calculates the average difference in pixel values across the two images. As per the findings by Wu et al. [39], the optimal NPCR and UACI values for a secure encryption algorithm are 99.609% and 33.464%, respectively.
In our study, we have implemented the (4, 5)-threshold algorithm detailed in the paper to embed random data into the six images depicted in Figure 5, with a fixed condition of B = 32. Following this, we conducted experimental assessments to ascertain the NPCR and UACI of the algorithm, the results of which are summarized in Table 13. Our algorithm showcases NPCR and UACI values closely tracking 99.609% and 33.464%, respectively, thus affirming its effectiveness in thwarting differential attacks. Noteworthy is the fact that the algorithm’s ciphertext feedback mechanism induces notable modifications in the encrypted image even in the presence of minor fluctuations in the plaintext image. Moreover, the algorithm discussed in this paper integrates encoding techniques, scrambling encryption, and XOR encryption, culminating in a robust and indeterminate system with enhanced security measures.
We have demonstrated through simulation the effectiveness of our algorithm in a controlled environment, but real-world validation in diverse and dynamic environments might reveal additional practical challenges and limitations. However, the validation of the algorithm is subject to numerous restrictive assumptions. The images used in our experiments are from existing image databases commonly used in algorithms to highlight the superiority of our algorithm, but real-world images vary in size. Furthermore, the performance evaluation metrics ER, PSNR, SRCC, and others used by existing algorithms are based on synthetic test data, which may not accurately reflect real-world scenarios. More diverse criteria are needed to test the effectiveness of the algorithm in practical applications. Lastly, limitations within the simulation environment may impact the scalability and applicability of the results. Therefore, the detection method of the existing RDH-EI algorithm in a controlled environment is still limited and requires further research.

5. Conclusions

Addressing the issues of limited embedding capacity and inadequate security encountered in current RDH-EI algorithms based on secret sharing, we propose an RDH-EI algorithm based on AMED prediction and MSS secret sharing. We have developed a uniquely designed AMED prediction technique with high accuracy and integrated it with the MSS scheme to create this advanced RDH-EI algorithm. The algorithm allows multiple data hiders to independently embed secret data, and receivers can determine the presence of attacks in the transmission environment through identifying information. The experimental results show that compared to existing methods, our algorithm significantly improves the embedding rate, achieving 7.2713 bpp, while achieving a PSNR of . Furthermore, the algorithm exhibits a pixel correlation close to 0 for marked encrypted images, with NPCR and UACI stabilizing around 99.609% and 33.464%, respectively, effectively resisting differential attacks. In the face of various unknown attack methods in diverse and dynamic environments, further enhancements are required to bolster the algorithm’s security. Our future endeavors will center on enhancing the embedding rate and extending the algorithm’s utility across a range of security scenarios.

Author Contributions

Conceptualization, Z.J. and M.Z.; methodology, Z.J. and W.D.; software, Z.J., C.J. and F.D.; validation, C.J. and F.D.; formal analysis, Z.J. and W.D.; resources, M.Z.; data curation, C.J. and F.D.; writing—original draft preparation, Z.J. and W.D.; writing—review and editing, Z.J., M.Z. and C.J.; visualization, W.D. and F.D.; supervision, M.Z.; project administration, M.Z. and C.J.; funding acquisition, M.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by The National Natural Science Foundation of China, Funding Number: 62272478, 62102450, 62102451.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The raw data supporting the conclusions of this article will be made available by the authors on request.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Boyes, H.; Hallaq, B.; Cunningham, J.; Watson, T. The industrial internet of things (IIoT): An analysis framework. Comput. Ind. 2018, 101, 1–12. [Google Scholar] [CrossRef]
  2. Puteaux, P.; Ong, S.; Wong, K.; Puech, W. A survey of reversible data hiding in encrypted images—The first 12 years. J. Vis. Commun. Image Represent. 2021, 77, 103085. [Google Scholar] [CrossRef]
  3. Ke, Y.; Zhang, M.; Liu, J.; Yang, X. Overview on reversible data hiding in encrypted domain. J. Comput. Appl. 2016, 36, 3067–3076. [Google Scholar]
  4. Puech, W.; Chaumont, M.; Strauss, O. A reversible data hiding method for encrypted images. In Proceedings of the Security, Forensics, Steganography, and Watermarking of Multimedia Contents X, San Jose, CA, USA, 28–30 January 2008; Volume 6819, pp. 534–542. [Google Scholar]
  5. Sahu, A.K.; Swain, G. High fidelity based reversible data hiding using modified LSB matching and pixel difference. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 1395–1409. [Google Scholar] [CrossRef]
  6. Yi, S.; Zhou, Y.; Hua, Z. Reversible data hiding in encrypted images using adaptive block-level prediction-error expansion. Signal Process. Image Commun. 2018, 64, 78–88. [Google Scholar] [CrossRef]
  7. Datta, K.; Jana, B.; Singh, P.K.; Chakraborty, M.D. Robust data hiding scheme for highly compressed image exploiting btc with hamming code. Multimed. Tools Appl. 2024, 83, 8591–8628. [Google Scholar] [CrossRef]
  8. Ke, Y.; Zhang, M.; Liu, J. Separable multiple bits reversible data hiding in encrypted domain. In Proceedings of the Digital Forensics and Watermarking: 15th International Workshop, IWDW 2016, Beijing, China, 17–19 September 2016; Revised Selected Papers 15. Springer: Berlin/Heidelberg, Germany, 2017; pp. 470–484. [Google Scholar]
  9. Wu, H.T.; Cheung, Y.M.; Zhuang, Z.; Xu, L.; Hu, J. Lossless data hiding in encrypted images compatible with homomorphic processing. IEEE Trans. Cybern. 2022, 53, 3688–3701. [Google Scholar] [CrossRef] [PubMed]
  10. Wang, Y.; He, W. High capacity reversible data hiding in encrypted image based on adaptive MSB prediction. IEEE Trans. Multimed. 2021, 24, 1288–1298. [Google Scholar] [CrossRef]
  11. Qu, L.; Chen, F.; Zhang, S.; He, H. Cryptanalysis of reversible data hiding in encrypted images by block permutation and co-modulation. IEEE Trans. Multimed. 2021, 24, 2924–2937. [Google Scholar]
  12. Ke, Y.; Zhang, M.Q.; Liu, J.; Su, T.T.; Yang, X.Y. Fully homomorphic encryption encapsulated difference expansion for reversible data hiding in encrypted domain. IEEE Trans. Circuits Syst. Video Technol. 2020, 30, 2353–2365. [Google Scholar] [CrossRef]
  13. Ren, F.; Hao, Y.; Pang, K.; Wu, Z. Reversible data hiding scheme in encrypted images based on homomorphic encryption and pixel value ordering. Multimed. Tools Appl. 2024, 83, 40607–40627. [Google Scholar] [CrossRef]
  14. Kamil Khudhair, S.; Sahu, M.; Kr, R.; Sahu, A.K. Secure reversible data hiding using block-wise histogram shifting. Electronics 2023, 12, 1222. [Google Scholar] [CrossRef]
  15. Puyang, Y.; Yin, Z.; Qian, Z. Reversible data hiding in encrypted images with two-MSB prediction. In Proceedings of the 2018 IEEE International Workshop on Information Forensics and Security (WIFS), Hong Kong, China, 11–13 December 2018; pp. 1–7. [Google Scholar]
  16. Wang, X.; Chang, C.C.; Lin, C.C. Reversible data hiding in encrypted images with block-based adaptive MSB encoding. Inf. Sci. 2021, 567, 375–394. [Google Scholar] [CrossRef]
  17. Wang, X.; Li, L.Y.; Chang, C.C.; Chen, C.C. High-capacity reversible data hiding in encrypted images based on prediction error compression and block selection. Secur. Commun. Netw. 2021, 2021, 1–12. [Google Scholar] [CrossRef]
  18. Zhang, L.; Li, F.; Qin, C. Efficient reversible data hiding in encrypted binary image with Huffman encoding and weight prediction. Multimed. Tools Appl. 2022, 81, 29347–29365. [Google Scholar] [CrossRef]
  19. Chen, B.; Lu, W.; Huang, J.; Weng, J.; Zhou, Y. Secret sharing based reversible data hiding in encrypted images with multiple data-hiders. IEEE Trans. Dependable Secur. Comput. 2020, 19, 978–991. [Google Scholar] [CrossRef]
  20. Zhao, X.; Yang, C.; Liu, F. On the sharing-based model of steganography. In Proceedings of the Digital Forensics and Watermarking: 19th International Workshop, IWDW 2020, Melbourne, VIC, Australia, 25–27 November 2020; Revised Selected Papers 19. Springer: Berlin/Heidelberg, Germany, 2021; pp. 94–105. [Google Scholar]
  21. Xiong, L.; Han, X.; Yang, C.N.; Zhang, X. Reversible data hiding in shared images based on syndrome decoding and homomorphism. IEEE Trans. Cloud Comput. 2023, 11, 3085–3098. [Google Scholar] [CrossRef]
  22. Hua, Z.; Wang, Y.; Yi, S.; Zhou, Y.; Jia, X. Reversible data hiding in encrypted images using cipher-feedback secret sharing. IEEE Trans. Circuits Syst. Video Technol. 2022, 32, 4968–4982. [Google Scholar] [CrossRef]
  23. Hua, Z.; Wang, Y.; Yi, S.; Zheng, Y.; Liu, X.; Chen, Y.; Zhang, X. Matrix-based secret sharing for reversible data hiding in encrypted images. IEEE Trans. Dependable Secur. Comput. 2022, 20, 3669–3686. [Google Scholar] [CrossRef]
  24. Yu, C.; Zhang, X.; Qin, C.; Tang, Z. Reversible data hiding in encrypted images with secret sharing and hybrid coding. IEEE Trans. Circuits Syst. Video Technol. 2023, 33, 6443–6458. [Google Scholar] [CrossRef]
  25. Hua, Z.; Liu, X.; Zheng, Y.; Yi, S.; Zhang, Y. Reversible data hiding over encrypted images via preprocessing-free matrix secret sharing. IEEE Trans. Circuits Syst. Video Technol. 2023, 34, 1799–1814. [Google Scholar] [CrossRef]
  26. Shirisha, B.; Prasad, V.K. Reversible Data Hiding in Encrypted Images Based on Chaotic Logistic Map and Median Edge Detector. Int. J. Intell. Syst. Appl. Eng. 2023, 11, 233–245. [Google Scholar]
  27. Li, X.; Zhang, W.; Gui, X.; Yang, B. Efficient reversible data hiding based on multiple histograms modification. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2016–2027. [Google Scholar]
  28. Bas, P.; Filler, T.; Pevnỳ, T. “Break our steganographic system”: The ins and outs of organizing BOSS. In International Workshop on Information Hiding; Springer: Berlin/Heidelberg, Germany, 2011; pp. 59–70. [Google Scholar]
  29. Bas, P.; Furon, T. Image Database of BOWS-2. Available online: https://web.archive.org/web/20220619214621/http://bows2.ec-lille.fr/index.php (accessed on 20 June 2017).
  30. Schaefer, G.; Stich, M. UCID: An uncompressed color image database. In Storage and Retrieval Methods and Applications for Multimedia 2004, Proceedings of the Electronic Imaging 2004, San Jose, CA, USA, 18–22 January 2004; SPIE: Bellingham, WA, USA, 2004; Volume 5307, pp. 472–480. [Google Scholar]
  31. Shamir, A. How to share a secret. Commun. ACM 1979, 22, 612–613. [Google Scholar] [CrossRef]
  32. Kotha, S.K.; Rani, M.S.; Subedi, B.; Chunduru, A.; Karrothu, A.; Neupane, B.; Sathishkumar, V. A comprehensive review on secure data sharing in cloud environment. Wirel. Pers. Commun. 2022, 127, 2161–2188. [Google Scholar] [CrossRef]
  33. Wei-Pang, C.; Ntafos, S. The zookeeper route problem. Inf. Sci. 1992, 63, 245–259. [Google Scholar] [CrossRef]
  34. Jose, J.; Subramoni, H.; Luo, M.; Zhang, M.; Huang, J.; Wasi-ur Rahman, M.; Islam, N.S.; Ouyang, X.; Wang, H.; Sur, S.; et al. Memcached design on high performance RDMA capable interconnects. In Proceedings of the 2011 International Conference on Parallel Processing, Taipei, China, 13–16 September 2011; pp. 743–752. [Google Scholar]
  35. Posner, J.; Fohry, C. Fault Tolerance for Cooperative Lifeline-Based Global Load Balancing in Java with APGAS and Hazelcast. In Proceedings of the 2017 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW), Orlando, FL, USA, 29 May–2 June 2017; pp. 854–863. [Google Scholar]
  36. Kamburugamuve, S.; Fox, G.; Leake, D.; Qiu, J. Survey of Apache Big Data Stack; Indiana University: Bloomington, IN, USA, 2013. [Google Scholar]
  37. Zeynally, T.; Demidov, D.; Dimitrov, L. Prioritization of Distributed Worker Processes Based on Etcd Locks. In International Scientific and Practical Conference on Information Technologies and Intelligent Decision Making Systems; Springer: Berlin/Heidelberg, Germany, 2021; pp. 93–103. [Google Scholar]
  38. Wang, Z.; Li, Q. Information content weighting for perceptual image quality assessment. IEEE Trans. Image Process. 2010, 20, 1185–1198. [Google Scholar] [CrossRef]
  39. Wu, Y.; Noonan, J.P.; Agaian, S. NPCR and UACI randomness tests for image encryption. Cyber J. Multidiscip. J. Sci. Technol. J. Sel. Areas Telecommun. (JSAT) 2011, 1, 31–38. [Google Scholar]
Figure 1. Application scenarios of double-blind IPR. (a) Traditional review application scenario. (b) New review application scenario with error detection functionality.
Figure 1. Application scenarios of double-blind IPR. (a) Traditional review application scenario. (b) New review application scenario with error detection functionality.
Applsci 14 06267 g001
Figure 2. Pixel prediction block segmentation.
Figure 2. Pixel prediction block segmentation.
Applsci 14 06267 g002
Figure 3. Algorithm framework diagram.
Figure 3. Algorithm framework diagram.
Applsci 14 06267 g003
Figure 4. An example of calculating the label value of a pixel.
Figure 4. An example of calculating the label value of a pixel.
Applsci 14 06267 g004
Figure 5. Six commonly used images in experiments. (a) Airplane. (b) Baboon. (c) Jetplane. (d) Lena. (e) Man. (f) Tiffany.
Figure 5. Six commonly used images in experiments. (a) Airplane. (b) Baboon. (c) Jetplane. (d) Lena. (e) Man. (f) Tiffany.
Applsci 14 06267 g005
Figure 6. Images generated during the experiment. (a) Original image. (b) Encrypted image. (c) Marked encrypted image I. (d) Marked encrypted image II. (e) Marked encrypted image III. (f) Marked encrypted image IV. (g) Recovered image.
Figure 6. Images generated during the experiment. (a) Original image. (b) Encrypted image. (c) Marked encrypted image I. (d) Marked encrypted image II. (e) Marked encrypted image III. (f) Marked encrypted image IV. (g) Recovered image.
Applsci 14 06267 g006
Figure 7. Comparison chart of PSNR variations at different ERs. [5,7,14,18,21].
Figure 7. Comparison chart of PSNR variations at different ERs. [5,7,14,18,21].
Applsci 14 06267 g007
Figure 8. Performance of the algorithm’s ERs Across different databases. (a) ERs on the BOSSBase database. (b) ERs on the BOWS-2 database. (c) ERs on the UCID database.
Figure 8. Performance of the algorithm’s ERs Across different databases. (a) ERs on the BOSSBase database. (b) ERs on the BOWS-2 database. (c) ERs on the UCID database.
Applsci 14 06267 g008
Figure 9. Comparison of ERs between the proposed algorithm and existing algorithms. [5,14,21,22,23,24].
Figure 9. Comparison of ERs between the proposed algorithm and existing algorithms. [5,14,21,22,23,24].
Applsci 14 06267 g009
Figure 10. Comparison experiment of information extraction versus pre-embedding information. (a) Comparison experiment I of secret data. (b) Comparison experiment II of secret data. (c) Comparison experiment I of identifying information. (d) Comparison experiment II of identifying information. (e) Comparison experiment III of identifying information. (f) Comparison experiment IV of identifying information.
Figure 10. Comparison experiment of information extraction versus pre-embedding information. (a) Comparison experiment I of secret data. (b) Comparison experiment II of secret data. (c) Comparison experiment I of identifying information. (d) Comparison experiment II of identifying information. (e) Comparison experiment III of identifying information. (f) Comparison experiment IV of identifying information.
Applsci 14 06267 g010
Figure 11. Results of pixel distribution in experimental images. (a) Histogram of the original image. (b) 3D pixel distribution of the original image. (c) Histogram of the encrypted image. (d) 3D pixel distribution of the encrypted image. (ej) Pixel distribution and of the marked encrypted images I, II, III. (k) Histogram of the original image. (l) 3D pixel distribution of the recovered image.
Figure 11. Results of pixel distribution in experimental images. (a) Histogram of the original image. (b) 3D pixel distribution of the original image. (c) Histogram of the encrypted image. (d) 3D pixel distribution of the encrypted image. (ej) Pixel distribution and of the marked encrypted images I, II, III. (k) Histogram of the original image. (l) 3D pixel distribution of the recovered image.
Applsci 14 06267 g011
Figure 12. Scatter plot of correlation coefficient of test images. (a) Horizontal distribution of the original image. (b) Horizontal distribution of the marked encrypted image. (c) Vertical distribution of the original image. (d) Vertical distribution of the marked encrypted image. (e) Diagonal distribution of the original image. (f) Diagonal distribution of the marked encrypted image.
Figure 12. Scatter plot of correlation coefficient of test images. (a) Horizontal distribution of the original image. (b) Horizontal distribution of the marked encrypted image. (c) Vertical distribution of the original image. (d) Vertical distribution of the marked encrypted image. (e) Diagonal distribution of the original image. (f) Diagonal distribution of the marked encrypted image.
Applsci 14 06267 g012
Table 1. Comparison of previous algorithm limitations and solutions offered by our proposed algorithm.
Table 1. Comparison of previous algorithm limitations and solutions offered by our proposed algorithm.
RDH-EI AlgorithmsLimitationsApproach to Problem-Solving
Puech et al. [4]Low securityUsing scrambling and exclusive or (XOR) encryption
Wang et al. [10] and Shirisha et al. [26]Low prediction accuracyUsing AMED technology
Ren et al. [13]High-entropy constraints on ciphertext statePre-encryption recoding
Zhang et al. [18]Embedding rate constrained by image textureUtilizing the characteristics of the cipher itself to embed data.
Yu et al. [24] and Hua et al. [25]Inability to ensure data integrityDesigning identifying information for detection
Table 2. Pixel coding and load capacity statistics.
Table 2. Pixel coding and load capacity statistics.
LabelCapacity (bits)DistributionCodeCode Length (bits)Load (bits)
01147111115−4
12148111105−3
2323111104−1
3450410131
458090023
566740124
6763310034
78369110144
88454110044
Table 3. Embedding rates and correlation statistics of different images.
Table 3. Embedding rates and correlation statistics of different images.
ImagesTotal Capacity (bits)Code Length (bits)Extra Bits (bits)Total Load (bits)ERs (bpp)
Jetplane1,590,321792,651633797,0375.5202
Man5,622,8293,118,40223612,502,0665.1931
Airplane1,663,820683,251633979,9365.8690
Tiffany1,537,779785,567633751,5795.4335
Baboon1,085,666796,502633288,5314.5503
Lena1,477,960792,862633684,4655.3055
Table 4. The embedding rates and peak signal-to-noise ratio of the algorithm proposed in this paper across various datasets.
Table 4. The embedding rates and peak signal-to-noise ratio of the algorithm proposed in this paper across various datasets.
DatasetsThreshold ValueCriteriaBest CaseWorst CaseAverage
BOSSbase(3, 4)ER (bpp)6.94874.34465.6934
PSNR
(6, 6)ER (bpp)7.64956.78157.2311
PSNR
BOW-2(3, 4)ER (bpp)6.81094.32595.6361
PSNR
(6, 6)ER (bpp)7.60356.77527.2120
PSNR
USID(3, 4)ER (bpp)7.33994.27525.8142
PSNR
(6, 6)ER (bpp)7.77996.75837.2713
PSNR
Table 5. Embedding rate under different parameters of the algorithm.
Table 5. Embedding rate under different parameters of the algorithm.
Threshold Value B = 32 B = 64 B = 128 B = 256 B = 512
(2, 2)5.19785.19305.18975.18675.1839
(3, 3)6.13186.12876.12656.12456.1226
(3, 4)5.19785.19305.18975.18675.1839
(4, 4)6.59896.59656.59486.59336.5919
(4, 5)5.75825.75445.75185.74945.7471
(5, 5)6.87916.87726.87596.87466.8735
(5, 6)6.13186.12876.12656.1246.1226
(5, 7)5.59815.59405.59125.58865.5862
(6, 6)7.06597.06437.06327.06227.0612
(6, 7)6.39876.39606.39416.39246.3907
(6, 8)5.89835.89475.89235.89005.8879
(12, 12)7.53307.53277.53207.53117.5306
(12, 14)6.79916.79756.79686.79496.7931
(12, 16)6.24876.23706.24636.24266.2399
Table 6. Comparison of data expansion rates for different algorithms.
Table 6. Comparison of data expansion rates for different algorithms.
AlgorithmsTypeEncryption MethodsRelative Expansion RateTotal Expansion Rate
Kamil et al. [14]VRBEStream cipher11
Ke et al. [12]VRIEHomomorphic encryption256256
Xiong et al. [21]VRAESecret sharing1n
Hua et al. [22]VRAESecret sharing 1 / ( r 1 ) n / ( r 1 )
Hua et al. [23]VRAESecret sharing1n
Yu et al. [24]VRAESecret sharing1n
ProposedVRIE + VRAESecret sharing1n
Table 7. Computational complexities of different RHD-EI algorithms.
Table 7. Computational complexities of different RHD-EI algorithms.
AlgorithmsEncryption MethodsComputational Complexity
Data EmbeddingData ExtractionImage Recovery
Puech et al. [4]AES encryption O ( 1 ) O ( 1 ) O ( 1 )
Ke et al. [8]LWE encryption O ( N 2 ) O ( 1 ) O ( N 2 )
Ren et al. [13]Paillier encryption O ( N 3 ) O ( 1 ) O ( N 3 )
Chen et al. [19]Shamir Secret sharing O ( N ) O ( 1 ) O ( N log 2 N )
Hua et al. [22]CFSS Secret sharing O ( N ) O ( 1 ) O ( N log 2 N )
ProposedMSS Secret sharing O ( N ) O ( N 2 log 2 N ) O ( N log 2 N )
Table 8. Comparison results between Redisson distributed lock and other distributed locks.
Table 8. Comparison results between Redisson distributed lock and other distributed locks.
Other Existing Distributed LocksDisadvantagesRedisson Distributed Lock Advantages
ZooKeeper distributed lock [33]Relies on external storage media, increasing system development costsBuilt-in complete persistence support
Memcached distributed lock [34]Slower response speedFast response speed and low latency
Hazelcast distributed lock [35]Lacks flexibilitySuitable for a wider range of scenario needs
Apache Curator distributed lock [36]Complex deploymentSimple and easy to use
Etcd distributed lock [37]Lacks fault toleranceHigh fault tolerance, supports fine-grained lock control
Table 9. Results of concurrent user access under Redisson distributed lock.
Table 9. Results of concurrent user access under Redisson distributed lock.
TimestampsBehavior of Thread B after Attempting to LockRemaining Time for the Lock to Expire
t = 5.00 sFailed locking attempt, message subscription for listening25.04 s
t = 10.00 sListening29.97 s
t = 15.00 sListening24.98 s
t = 25.00 sListening25.04 s
t = 30.00 sListening19.94 s
t = 50.00 sSuccessful locking, system occupation30.00s
t = 55.00 sOccupying the system25.83 s
t = 65.00 sOccupying the system26.00 s
Table 10. Correlation coefficient of test images.
Table 10. Correlation coefficient of test images.
DirectionOriginal ImageEncrypted ImageMarked Encrypted Image IMarked Encrypted Image IIMarked Encrypted Image IIIAverage of the Marked Encrypted Images
horizontal0.95820.00150.00190.00270.00220.0023
vertical0.96560.00160.00330.00250.00260.0028
diagonal0.93820.00210.00150.00190.00270.0021
Table 11. SRCC and KRCC evaluation of the (3, 3)-threshold algorithm in this study.
Table 11. SRCC and KRCC evaluation of the (3, 3)-threshold algorithm in this study.
ImagesSRCC (%)KRCC (%)
IM 1 IM 2 IM 3 IM 1 IM 2 IM 3
Baboon−0.45280.07150.15180.5626−0.22530.0455
Tiffany0.55490.25610.08420.21510.41580.0454
Man0.32540.25450.03250.12560.16540.0532
Airplane0.23950.03890.15230.06540.36220.5696
Jetplane0.69150.28920.65120.07150.03120.5782
Lena0.27460.36250.02140.15470.51540.0354
Table 12. Information entropy of test images.
Table 12. Information entropy of test images.
Carrier ImageOriginal ImageEncrypted ImageMarked Encrypted Image IMarked Encrypted Image IIMarked Encrypted Image IIIAverage of the Marked Encrypted Images
Lena7.44567.99117.99127.99137.99157.9913
Baboon7.35777.99177.99127.99167.99117.9913
Man7.30137.99167.99137.99157.99177.9915
Goldhill7.47787.99177.99157.99157.99127.9914
Table 13. The embedding rates and peak signal-to-noise ratio of the algorithm proposed in this paper across various datasets.
Table 13. The embedding rates and peak signal-to-noise ratio of the algorithm proposed in this paper across various datasets.
ImagesNPCR (%)UACI (%)
IM 1 IM 2 IM 3 IM 4 IM 5 IM 1 IM 2 IM 3 IM 4 IM 5
Airplane99.685399.651299.645299.602199.532433.485233.122033.654233.452633.7512
Baboon99.562499.645299.697599.513599.496533.810233.561533.641233.235133.1522
Lena99.562199.486099.654199.703199.651433.561533.814333.254533.325433.8472
Jetplane99.711299.642199.581599.321599.625633.678133.254833.897233.248233.7957
Tiffany99.556899.540699.645299.594599.651233.241833.575133.725133.124133.7512
Man99.561299.642599.702999.561299.494233.145833.521633.578233.987533.5442
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Jiang, Z.; Zhang, M.; Dong, W.; Jiang, C.; Di, F. Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Matrix-Based Secret Sharing. Appl. Sci. 2024, 14, 6267. https://doi.org/10.3390/app14146267

AMA Style

Jiang Z, Zhang M, Dong W, Jiang C, Di F. Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Matrix-Based Secret Sharing. Applied Sciences. 2024; 14(14):6267. https://doi.org/10.3390/app14146267

Chicago/Turabian Style

Jiang, Zongbao, Minqing Zhang, Weina Dong, Chao Jiang, and Fuqiang Di. 2024. "Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Matrix-Based Secret Sharing" Applied Sciences 14, no. 14: 6267. https://doi.org/10.3390/app14146267

APA Style

Jiang, Z., Zhang, M., Dong, W., Jiang, C., & Di, F. (2024). Reversible Data Hiding Algorithm in Encrypted Images Based on Adaptive Median Edge Detection and Matrix-Based Secret Sharing. Applied Sciences, 14(14), 6267. https://doi.org/10.3390/app14146267

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop