<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
<journal-title-group><journal-title>Informatica</journal-title></journal-title-group>
<issn pub-type="epub">1822-8844</issn><issn pub-type="ppub">0868-4952</issn><issn-l>0868-4952</issn-l>
<publisher>
<publisher-name>Vilnius University</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="publisher-id">INFOR521</article-id>
<article-id pub-id-type="doi">10.15388/23-INFOR521</article-id>
<article-categories><subj-group subj-group-type="heading">
<subject>Research Article</subject></subj-group></article-categories>
<title-group>
<article-title>A Robust and High-Capacity Coverless Information Hiding Based on Combination Theory</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name><surname>Anggriani</surname><given-names>Kurnia</given-names></name><xref ref-type="aff" rid="j_infor521_aff_001">1</xref><xref ref-type="aff" rid="j_infor521_aff_002">2</xref><bio>
<p><bold>K. Anggriani</bold> received her BS degree in informatics from University of Bengkulu, Indonesia, in 2011, and the MS degree in informatics from Bandung Institute of Technology, Indonesia, in 2014. She is a lecturer at the Department of Information System, Engineering Faculty, University of Bengkulu, Indonesia. Currently, she is pursuing her PhD degree in Asia University, Taiwan. Her current research interests include steganography and image processing.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Chiou</surname><given-names>Shu-Fen</given-names></name><xref ref-type="aff" rid="j_infor521_aff_003">3</xref><bio>
<p><bold>S.-F. Chiou</bold> received the BBA degree in information management from National Taichung Institute of Technology, Taichung, Taiwan, ROC, in 2004. She studied for a MS degree in computer science and engineering at the National Chung Hsing University for one year, and then started to pursue her PhD degree. She received her PhD in computer science and engineering from National Chung Hsing University in 2012. She is currently an assistant professor in the Department of Information Management, National Taichung University of Science and Technology. Her current research interests include information security, network security, data hiding, text mining and big data analysis.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Wu</surname><given-names>Nan-I</given-names></name><xref ref-type="aff" rid="j_infor521_aff_004">4</xref><bio>
<p><bold>N.-I Wu</bold> received his PhD from the Institute of Computer Science and Engineering, Nation Chung Hsing University (NCHU), Taichung, Taiwan 2009. From 2010 to 2011, he was a post-doctoral research fellow at the Academia Sinica Institute of Information Science. He was an assistant professor at the Department of Animation and Game Design, TOKO University (Taiwan), during 2011–2018, and an associate professor during 2018–2019. He was an associate professor at the Department of Digital Multimedia, Lee-Ming Institute of Technology (Taiwan) during 2019–2023. Now he is an associate professor at the Department of Information Management, Lunghwa University of Science and Technology (Taiwan) since 2023 and also the director of the eSports Training Centre since 2020. His current research interests include game design, eSports training/management, multimedia processing, multimedia security, data hiding, and privacy-preserving. He published over ten international journal papers (SCI) and conference papers.</p></bio>
</contrib>
<contrib contrib-type="author">
<name><surname>Hwang</surname><given-names>Min-Shiang</given-names></name><email xlink:href="mshwang@asia.edu.tw">mshwang@asia.edu.tw</email><xref ref-type="aff" rid="j_infor521_aff_001">1</xref><xref ref-type="aff" rid="j_infor521_aff_005">5</xref><xref ref-type="corresp" rid="cor1">∗</xref><bio>
<p><bold>N.-I Wu</bold> received his PhD from the Institute of Computer Science and Engineering, Nation Chung Hsing University (NCHU), Taichung, Taiwan 2009. From 2010 to 2011, he was a post-doctoral research fellow at the Academia Sinica Institute of Information Science. He was an assistant professor at the Department of Animation and Game Design, TOKO University (Taiwan), during 2011–2018, and an associate professor during 2018–2019. He was an associate professor at the Department of Digital Multimedia, Lee-Ming Institute of Technology (Taiwan) during 2019–2023. Now he is an associate professor at the Department of Information Management, Lunghwa University of Science and Technology (Taiwan) since 2023 and also the director of the eSports Training Centre since 2020. His current research interests include game design, eSports training/management, multimedia processing, multimedia security, data hiding, and privacy-preserving. He published over ten international journal papers (SCI) and conference papers.</p></bio>
</contrib>
<aff id="j_infor521_aff_001"><label>1</label>Department of Computer Science &amp; Information Engineering, <institution>Asia University</institution>, Taichung 41354, <country>Taiwan</country></aff>
<aff id="j_infor521_aff_002"><label>2</label>Department of Information System, <institution>University of Bengkulu</institution>, <country>Indonesia</country></aff>
<aff id="j_infor521_aff_003"><label>3</label>Department of Information Management, <institution>National Taichung University of Science and Technology</institution>, <country>Taiwan</country></aff>
<aff id="j_infor521_aff_004"><label>4</label>Department of Information Management, <institution>Lunghwa University of Science and Technology</institution>, <country>Taiwan</country></aff>
<aff id="j_infor521_aff_005"><label>5</label>Department of Medical Research, China Medical University Hospital, <institution>China Medical University</institution>, <country>Taiwan</country></aff>
</contrib-group>
<author-notes>
<corresp id="cor1"><label>∗</label>Corresponding author.</corresp>
</author-notes>
<pub-date pub-type="ppub"><year>2023</year></pub-date><pub-date pub-type="epub"><day>15</day><month>6</month><year>2023</year></pub-date><volume>34</volume><issue>3</issue><fpage>449</fpage><lpage>464</lpage><history><date date-type="received"><month>1</month><year>2023</year></date><date date-type="accepted"><month>5</month><year>2023</year></date></history>
<permissions><copyright-statement>© 2023 Vilnius University</copyright-statement><copyright-year>2023</copyright-year>
<license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/4.0/">
<license-p>Open access article under the <ext-link ext-link-type="uri" xlink:href="http://creativecommons.org/licenses/by/4.0/">CC BY</ext-link> license.</license-p></license></permissions>
<abstract>
<p>Many confidential multimedia, such as personal privacy, commercial, and military secrets, are transmitted on the Internet. To prevent this confidential multimedia from being eavesdropped on by illegal users, information-hiding technology is a leading research topic nowadays. One of the important research topics of information-hiding technology is coverless information hiding, which utilizes the unchanged property of its multimedia carrier to hide secret information. In this paper, we propose two schemes that employ the average pixel value of an image. The first is an extension of the Coverless Information Hiding Based on the Most Significant Bit (CIHMSB) scheme, referred to as E-CIHMSB. In the E-CIHMSB, we build an extended matrix containing the image fragment’s average pixel value. The second scheme is a combination theory-based CIHMSB, referred to as CB-CIHMSB. In the CB-CIHMSB, we construct the combined matrix. E-CIHMSB and CB-CIHMSB embed the secret bits by changing the most significant bits of the chosen pixel in the matrix. Experimental results show that our schemes achieved higher hiding capacity than previous related schemes. Moreover, the proposed scheme is more robust against steganalysis tools and image quality attacks such as Additive Gaussian White Noise (AWGN), Salt &amp; Pepper noise, low-pass filtering attacks, and JPEG compression attacks than CIHMSB.</p>
</abstract>
<kwd-group>
<label>Key words</label>
<kwd>coverless information hiding</kwd>
<kwd>image data hiding</kwd>
<kwd>image steganography</kwd>
<kwd>most significant bit</kwd>
</kwd-group>
</article-meta>
</front>
<body>
<sec id="j_infor521_s_001">
<label>1</label>
<title>Introduction</title>
<p>The need for information security in the internet age is inevitable. This is because sensitive information such as military, health care, economic, and personal data is exposed in many applications (Stillman and Defiore, <xref ref-type="bibr" rid="j_infor521_ref_019">1980</xref>; Liang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_007">2020</xref>; Oh <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_015">2019</xref>; Iwaya <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_006">2020</xref>; Coleti <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_005">2020</xref>). One solution to this issue is to implement data-hiding techniques. There are two types of data hiding mechanisms: covered and coverless. Covered information hiding is a well-known and widely investigated topic. In a covered information hiding scenario, the sender must provide a cover media to embed secret messages and create stego media. Cover media include images, audio, and video formats (Mahmoud and Elshoush, <xref ref-type="bibr" rid="j_infor521_ref_013">2022</xref>; Cogranne <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_004">2022</xref>; Yi <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_023">2019</xref>; Liu Y. <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_010">2022</xref>; Mstafa <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_014">2020</xref>; Wang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_021">2019</xref>). The stego media is then delivered to the recipient. The alteration of the stego media causes distortion and leaves a trace for steganographic analysis tools. Moreover, the hiding capacity of the covered information hiding method has certain limitations due to balancing the stego image quality. Because the greater the hiding capacity, the lower the image quality.</p>
<p>On the other side, the coverless information hiding offers higher hiding capacity without affecting the image quality. The secret messages and cover images are sent as a code stream to the recipient. Furthermore, the coverless information hiding method is more robust against the steganographic analysis tools. The coverless information hiding method utilizes the unchanged property of its multimedia carrier to hide secret information such as pixel value, brightness, and texture. There are several current researches in coverless data hiding (Qin <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_017">2019</xref>; Peng <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_016">2022</xref>; Zhou <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_025">2019</xref>; Wang and Gao, <xref ref-type="bibr" rid="j_infor521_ref_020">2019</xref>; Luo <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_012">2021</xref>; Zhou <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_026">2022</xref>; Chen <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_003">2022</xref>; Zhang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_024">2018</xref>; Liu <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_008">2022</xref>; Yang <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_022">2020</xref>; Long <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_011">2019</xref>; Saad <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_018">2021</xref>; Anggriani <italic>et al.</italic>, <xref ref-type="bibr" rid="j_infor521_ref_001">2023a</xref>, <xref ref-type="bibr" rid="j_infor521_ref_002">2023b</xref>).</p>
<p>In 2020, Peng <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor521_ref_016">2022</xref>) proposed a coverless information-hiding method based on the Most Significant Bit (MSB) of the cover image (CIHMSB). Their scheme was fragment-based calculation. Begin by segmenting the cover image into several fragments, calculating the average intensity of each fragment, and using the MSB to represent the secret information. As a result, the mapping sequence is used to establish a mapping between the image fragment’s MSB and the confidential data. This process generates a mapping flag sent along with the stego image by the sender.</p>
<p>Yang <italic>et al</italic>.’s scheme (<xref ref-type="bibr" rid="j_infor521_ref_022">2020</xref>) is highly resistant to all steganalysis tool attacks because the cover image is the same as the stego image. This scheme, however, has a lower embedding capacity. This is because each segment only embeds one bit—the larger the fragment, the lower the embedding capacity. To address this issue, we propose a change in which the fragment value is used. In addition, we add more average value of the fragment by implementing the concept of combination theory. We can improve the embedding capacity by conducting this approach. Moreover, the proposed scheme is more robust against steganalysis tools and image attacks.</p>
<p>The remainder of the work is presented: Section <xref rid="j_infor521_s_002">2</xref> presents the criteria for evaluating the information-hiding method’s performance. Section <xref rid="j_infor521_s_006">3</xref> explains our proposed method. Then, Section <xref rid="j_infor521_s_009">4</xref> discusses the experimental results. Finally, Section <xref rid="j_infor521_s_013">5</xref> addresses the conclusions.</p>
</sec>
<sec id="j_infor521_s_002">
<label>2</label>
<title>The Evaluation Criteria</title>
<p>This section presents some of the parameters used to measure the performance of the information-hiding method. Three evaluation criteria are generally used: image quality assessment, hiding capacity assessment, and robustness analysis.</p>
<sec id="j_infor521_s_003">
<label>2.1</label>
<title>Image Quality Assessment</title>
<p>The image quality was assessed using the structural similarity (SSIM) index and universal image quality <inline-formula id="j_infor521_ineq_001"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Q</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$({Q_{i}})$]]></tex-math></alternatives></inline-formula> index.</p>
<p>The structural similarity (SSIM) index measures the similarity between the cover and stego images. Its value ranges from −1 to +1. When the cover image is the same as the stego image, SSIM is equal to 1, which is also the optimal value of SSIM. It can be expressed by (<xref rid="j_infor521_eq_001">1</xref>): 
<disp-formula id="j_infor521_eq_001">
<label>(1)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mtext mathvariant="italic">SSIM</mml:mtext>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">q</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover>
<mml:mo>+</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>2</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>+</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>+</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">q</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>+</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo fence="true" stretchy="false">]</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \textit{SSIM}=\frac{(2\bar{p}\bar{q}+{c_{1}})(2{\sigma _{xy}}+{c_{2}})}{[{(\bar{p})^{2}}+{(\bar{q})^{2}}+{c_{1}}]({\sigma _{x}^{2}}+{\sigma _{y}^{2}}+{c_{2}})},\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor521_ineq_002"><alternatives><mml:math><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$\bar{p}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor521_ineq_003"><alternatives><mml:math><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">q</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$\bar{q}$]]></tex-math></alternatives></inline-formula> represent the average pixel values of the cover and stego images, <inline-formula id="j_infor521_ineq_004"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\sigma _{x}^{2}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor521_ineq_005"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\sigma _{y}^{2}}$]]></tex-math></alternatives></inline-formula> represent the standard deviation of the cover image and the stego image, respectively. And <inline-formula id="j_infor521_ineq_006"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${\sigma _{xy}}$]]></tex-math></alternatives></inline-formula> represents the covariance between the cover and stego images. Constant <inline-formula id="j_infor521_ineq_007"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>2.55</mml:mn></mml:math><tex-math><![CDATA[${c_{1}}=2.55$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_008"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">c</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>7.65</mml:mn></mml:math><tex-math><![CDATA[${c_{2}}=7.65$]]></tex-math></alternatives></inline-formula>.</p>
<p>The universal image quality index <inline-formula id="j_infor521_ineq_009"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Q</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$({Q_{i}})$]]></tex-math></alternatives></inline-formula> is another important parameter to measure the similarity between the cover and stego images. When the cover image is the same as the stego image, <inline-formula id="j_infor521_ineq_010"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Q</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${Q_{i}}$]]></tex-math></alternatives></inline-formula> can get the optimal value of 1. The definition of <inline-formula id="j_infor521_ineq_011"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Q</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${Q_{i}}$]]></tex-math></alternatives></inline-formula> is as (<xref rid="j_infor521_eq_002">2</xref>): 
<disp-formula id="j_infor521_eq_002">
<label>(2)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Q</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mn>4</mml:mn>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">q</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover>
</mml:mrow>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo>+</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo fence="true" stretchy="false">[</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo>+</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">q</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo fence="true" stretchy="false">]</mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {Q_{i}}=\frac{4{\sigma _{xy}}\bar{p}\bar{q}}{({\sigma _{x}^{2}}+{\sigma _{y}^{2}})[{(\bar{p})^{2}}+{(\bar{q})^{2}}]},\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor521_ineq_012"><alternatives><mml:math><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">p</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$\bar{p}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor521_ineq_013"><alternatives><mml:math><mml:mover accent="true">
<mml:mrow>
<mml:mi mathvariant="italic">q</mml:mi>
</mml:mrow>
<mml:mo stretchy="false">¯</mml:mo></mml:mover></mml:math><tex-math><![CDATA[$\bar{q}$]]></tex-math></alternatives></inline-formula> represent the average pixel values of the cover and stego images, <inline-formula id="j_infor521_ineq_014"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\sigma _{x}^{2}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor521_ineq_015"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${\sigma _{y}^{2}}$]]></tex-math></alternatives></inline-formula> represent the standard deviation of the cover and stego images. In contrast, <inline-formula id="j_infor521_ineq_016"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">x</mml:mi>
<mml:mi mathvariant="italic">y</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${\sigma _{xy}}$]]></tex-math></alternatives></inline-formula> represents the covariance between the cover and stego images.</p>
</sec>
<sec id="j_infor521_s_004">
<label>2.2</label>
<title>Hiding Capacity Assessment</title>
<p>Hiding capacity is defined as the number of secret bits carried in an image. The measurement is <inline-formula id="j_infor521_ineq_017"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mtext mathvariant="italic">bits</mml:mtext>
<mml:mo>∗</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mtext mathvariant="italic">carrirer</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mo>−</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(\textit{bits}\ast {\textit{carrirer}^{-1}})$]]></tex-math></alternatives></inline-formula>.</p>
</sec>
<sec id="j_infor521_s_005">
<label>2.3</label>
<title>Robustness Analysis</title>
<p>Robustness analysis is done by providing an attack on the image. Some commonly used image attacks are Additive Gaussian White Noise (AGWN), salt &amp; pepper noise, Low-pass filtering, and JPEG compression. The attack is done on multiple tests. The final results are averaged over multiple tests.</p>
<p>Bit Error Rate (<italic>BER</italic>) is used as the criterion to evaluate the robustness. BER is defined as: 
<disp-formula id="j_infor521_eq_003">
<label>(3)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mtext mathvariant="italic">BER</mml:mtext>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
<mml:mrow>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>×</mml:mo>
<mml:mn>100</mml:mn>
<mml:mi mathvariant="normal">%</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \textit{BER}=\frac{{N_{m}}}{{N_{n}}}\times 100\% ,\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor521_ineq_018"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">m</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${N_{m}}$]]></tex-math></alternatives></inline-formula> represents the number of bits with errors when extracting secret information from the stego image, and <inline-formula id="j_infor521_ineq_019"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">N</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${N_{n}}$]]></tex-math></alternatives></inline-formula> represents the total number of bits of secret information to be hidden. The smaller the BER, the more robust the information-hiding method.</p>
</sec>
</sec>
<sec id="j_infor521_s_006">
<label>3</label>
<title>The Proposed Method</title>
<p>To address the limitation of hiding capacity in Peng <italic>et al.</italic> (<xref ref-type="bibr" rid="j_infor521_ref_016">2022</xref>), we propose two improvement schemes: An extension of Yang <italic>et al</italic>.’s scheme and the combination theory-based scheme. The flowchart of the proposed schemes is depicted in Fig. <xref rid="j_infor521_fig_001">1</xref> and Fig. <xref rid="j_infor521_fig_004">4</xref>, respectively. Furthermore, the proposed schemes can be classified into embedding and extracting procedures explained in the following subsections.</p>
<sec id="j_infor521_s_007">
<label>3.1</label>
<title>An Extension of Yang et al.’s Scheme</title>
<p>We extend Yang <italic>et al</italic>.’s scheme (<xref ref-type="bibr" rid="j_infor521_ref_022">2020</xref>) by adding an extra average of the fragments; for convenience, we call it E-CIHMSB. The proposed embedding procedures consist of three main steps: cover image preparation, secret data preparation, and mapping. Firstly, preprocess the cover image into fragment image <inline-formula id="j_infor521_ineq_020"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${S_{i}}$]]></tex-math></alternatives></inline-formula>. Then form an extended matrix that contains the average value of the fragment. Secondly, preprocess the secret data into binary format <inline-formula id="j_infor521_ineq_021"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula> so that it can be operated with the MSB of <inline-formula id="j_infor521_ineq_022"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">V</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${V_{i}}$]]></tex-math></alternatives></inline-formula>. Finally, a mapping operation between the MSB of <inline-formula id="j_infor521_ineq_023"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${v_{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor521_ineq_024"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula> is conducted. The embedding procedure is detailed and presented below:</p>
<list>
<list-item id="j_infor521_li_001">
<label>•</label>
<p><bold>Preparation of Cover Image</bold></p>
<list>
<list-item id="j_infor521_li_002">
<label>1.</label>
<p>Segment the cover image <italic>T</italic> of size <inline-formula id="j_infor521_ineq_025"><alternatives><mml:math>
<mml:mi mathvariant="italic">W</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">H</mml:mi></mml:math><tex-math><![CDATA[$W\times H$]]></tex-math></alternatives></inline-formula> pixels into (<inline-formula id="j_infor521_ineq_026"><alternatives><mml:math>
<mml:mi mathvariant="italic">w</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">h</mml:mi></mml:math><tex-math><![CDATA[$w\times h$]]></tex-math></alternatives></inline-formula>) non-overlapping fragment, <inline-formula id="j_infor521_ineq_027"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${S_{i}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor521_li_003">
<label>2.</label>
<p>Form a <italic>Matrix</italic> <inline-formula id="j_infor521_ineq_028"><alternatives><mml:math>
<mml:mn>1</mml:mn>
<mml:mo>=</mml:mo>
<mml:mo fence="true" stretchy="false">{</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mo>…</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">e</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo fence="true" stretchy="false">}</mml:mo></mml:math><tex-math><![CDATA[$1=\{{v_{1}},{v_{2}},\dots ,{v_{e}}\}$]]></tex-math></alternatives></inline-formula> 
<disp-formula id="j_infor521_eq_004">
<label>(4)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mtext mathvariant="italic">avg pixel of the sub-block</mml:mtext>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {v_{i}}=\textit{avg pixel of the sub-block}\]]]></tex-math></alternatives>
</disp-formula> 
<inline-formula id="j_infor521_ineq_029"><alternatives><mml:math>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mspace width="2.5pt"/>
<mml:mtext>to</mml:mtext>
<mml:mspace width="2.5pt"/>
<mml:mi mathvariant="italic">e</mml:mi></mml:math><tex-math><![CDATA[$i=1\hspace{2.5pt}\text{to}\hspace{2.5pt}e$]]></tex-math></alternatives></inline-formula>, where <italic>e</italic> = the number of the sub-block <inline-formula id="j_infor521_ineq_030"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${S_{i}}$]]></tex-math></alternatives></inline-formula> in image.</p>
</list-item>
<list-item id="j_infor521_li_004">
<label>3.</label>
<p>Extend the <italic>Matrix</italic> 1 by adding one value of the average of Matrix-1.</p>
</list-item>
<list-item id="j_infor521_li_005">
<label>4.</label>
<p>Convert <inline-formula id="j_infor521_ineq_031"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${v_{i}}$]]></tex-math></alternatives></inline-formula> into the eight-binary format.</p>
</list-item>
<list-item id="j_infor521_li_006">
<label>5.</label>
<p>Compute the embedding capacity of the cover image using (<xref rid="j_infor521_eq_005">5</xref>): 
<disp-formula id="j_infor521_eq_005">
<label>(5)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mtext mathvariant="italic">EC</mml:mtext>
<mml:mo>=</mml:mo>
<mml:mo mathvariant="normal" fence="true" maxsize="2.03em" minsize="2.03em">(</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mi mathvariant="italic">W</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">H</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">w</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">h</mml:mi>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo mathvariant="normal" fence="true" maxsize="2.03em" minsize="2.03em">)</mml:mo>
<mml:mo>+</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \textit{EC}=\bigg(\frac{W\times H}{w\times h}\bigg)+1.\]]]></tex-math></alternatives>
</disp-formula>
</p>
</list-item>
</list>
</list-item>
<list-item id="j_infor521_li_007">
<label>•</label>
<p><bold>Preparation of Secret Data</bold></p>
<list>
<list-item id="j_infor521_li_008">
<label>1.</label>
<p>Convert the secret data into a seven-binary format <inline-formula id="j_infor521_ineq_032"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula>;</p>
</list-item>
<list-item id="j_infor521_li_009">
<label>2.</label>
<p>Prepare <inline-formula id="j_infor521_ineq_033"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mtext mathvariant="italic">EC</mml:mtext></mml:math><tex-math><![CDATA[${M_{i}}=\textit{EC}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
</list>
</list-item>
<list-item id="j_infor521_li_010">
<label>•</label>
<p><bold>Mapping</bold></p>
<list>
<list-item id="j_infor521_li_011">
<label>1.</label>
<p>Identify the predefined key <italic>Q</italic> between a sender and receiver, where the length of <inline-formula id="j_infor521_ineq_034"><alternatives><mml:math>
<mml:mi mathvariant="italic">Q</mml:mi>
<mml:mo>=</mml:mo>
<mml:mtext mathvariant="italic">EC</mml:mtext></mml:math><tex-math><![CDATA[$Q=\textit{EC}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor521_li_012">
<label>2.</label>
<p>Organize a mapping between <inline-formula id="j_infor521_ineq_035"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula> and MSB of <inline-formula id="j_infor521_ineq_036"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${v_{i}}$]]></tex-math></alternatives></inline-formula> according to <italic>Q</italic>. Resulting mapping code <inline-formula id="j_infor521_ineq_037"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${Z_{i}}$]]></tex-math></alternatives></inline-formula>. The rule is shown in Table <xref rid="j_infor521_tab_001">1</xref>.</p>
</list-item>
</list>
</list-item>
</list>
<fig id="j_infor521_fig_001">
<label>Fig. 1</label>
<caption>
<p>The flowchart of an extension of Yang <italic>et al</italic>.’s scheme.</p>
</caption>
<graphic xlink:href="infor521_g001.jpg"/>
</fig>
<table-wrap id="j_infor521_tab_001">
<label>Table 1</label>
<caption>
<p>The mapping rule of embedding procedure.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_038"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">MSB of <inline-formula id="j_infor521_ineq_039"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${v_{i}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_040"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${Z_{i}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">0</td>
<td style="vertical-align: top; text-align: left">0</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Suppose we have a cover image <italic>I</italic> of size 8 × 8 pixels. Firstly, preprocess the cover image into a 4 × 4 non-overlapping fragment, so the number of fragment <inline-formula id="j_infor521_ineq_041"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[${S_{i}}=4$]]></tex-math></alternatives></inline-formula>. Then, form a Matrix 1 and extended matrix. The cover image preparation is presented in Fig. <xref rid="j_infor521_fig_002">2</xref>. Therefore, based on equation (<xref rid="j_infor521_eq_005">5</xref>), we can embed 5 bits of secret data. Suppose the character of secret data is A (the decimal value is 65). Convert into seven-binary format <inline-formula id="j_infor521_ineq_042"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="bold-italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn mathvariant="bold">1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">1</mml:mn></mml:math><tex-math><![CDATA[${\boldsymbol{M}_{\boldsymbol{i}}}=\mathbf{1},\mathbf{0},\mathbf{0},\mathbf{0},\mathbf{0},\mathbf{0},\mathbf{1}$]]></tex-math></alternatives></inline-formula>. Then, the embeddable <inline-formula id="j_infor521_ineq_043"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn></mml:math><tex-math><![CDATA[${M_{i}}=1,0,0,0,0$]]></tex-math></alternatives></inline-formula>. Suppose the mapping key <inline-formula id="j_infor521_ineq_044"><alternatives><mml:math>
<mml:mi mathvariant="bold-italic">Q</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn mathvariant="bold">2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">5</mml:mn></mml:math><tex-math><![CDATA[$\boldsymbol{Q}=\mathbf{2},\mathbf{1},\mathbf{4},\mathbf{3},\mathbf{5}$]]></tex-math></alternatives></inline-formula>. Finally, based on the rule in Table <xref rid="j_infor521_tab_001">1</xref>, <inline-formula id="j_infor521_ineq_045"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mtext mathvariant="bold">0 1 1 1 1</mml:mtext></mml:math><tex-math><![CDATA[${Z_{i}}=\textbf{0 1 1 1 1}$]]></tex-math></alternatives></inline-formula>, as shown in Fig. <xref rid="j_infor521_fig_003">3</xref>.</p>
<fig id="j_infor521_fig_002">
<label>Fig. 2</label>
<caption>
<p>An example of cover image preparation.</p>
</caption>
<graphic xlink:href="infor521_g002.jpg"/>
</fig>
<fig id="j_infor521_fig_003">
<label>Fig. 3</label>
<caption>
<p>An example of mapping.</p>
</caption>
<graphic xlink:href="infor521_g003.jpg"/>
</fig>
</sec>
<sec id="j_infor521_s_008">
<label>3.2</label>
<title>The Combination Theory-Based Scheme</title>
<p>The combination theory-based scheme adds more averages of the fragments with a combination theory; for convenience, we call it CB-CIHMSB. The proposed embedding procedures consist of three main steps: cover image preparation, secret data preparation, and mapping. Firstly, preprocess the cover image into fragment image <inline-formula id="j_infor521_ineq_046"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${S_{i}}$]]></tex-math></alternatives></inline-formula>. Then form a combined matrix by implementing the concept of combination without repetition. Secondly, preprocess the secret data into binary format <inline-formula id="j_infor521_ineq_047"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula> so that it can be operated with the MSB of <inline-formula id="j_infor521_ineq_048"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${v^{\prime }_{i}}$]]></tex-math></alternatives></inline-formula>. Finally, a mapping operation between the MSB of <inline-formula id="j_infor521_ineq_049"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${v^{\prime }_{i}}$]]></tex-math></alternatives></inline-formula> and <inline-formula id="j_infor521_ineq_050"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula> is conducted. The embedding procedure is detailed and presented below:</p>
<list>
<list-item id="j_infor521_li_013">
<label>•</label>
<p>Preparation of Cover Image</p>
<list>
<list-item id="j_infor521_li_014">
<label>1.</label>
<p>Segment the cover image <italic>T</italic> of size <inline-formula id="j_infor521_ineq_051"><alternatives><mml:math>
<mml:mi mathvariant="italic">W</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">H</mml:mi></mml:math><tex-math><![CDATA[$W\times H$]]></tex-math></alternatives></inline-formula> pixels into <inline-formula id="j_infor521_ineq_052"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">w</mml:mi>
<mml:mo>×</mml:mo>
<mml:mi mathvariant="italic">h</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(w\times h)$]]></tex-math></alternatives></inline-formula> non-overlapping fragment, <inline-formula id="j_infor521_ineq_053"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${S_{i}}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor521_li_015">
<label>2.</label>
<p>Form the combined matrix without repetition.</p>
</list-item>
</list>
</list-item>
</list>
<p>Firstly, obtain the number of combined matrix (<inline-formula id="j_infor521_ineq_054"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mtext mathvariant="italic">NC</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${\textit{NC}_{r}}$]]></tex-math></alternatives></inline-formula>) by (<xref rid="j_infor521_eq_006">6</xref>): 
<disp-formula id="j_infor521_eq_006">
<label>(6)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:msub>
<mml:mrow>
<mml:mtext mathvariant="italic">NC</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo><mml:mstyle displaystyle="true">
<mml:mfrac>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>!</mml:mo>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>!</mml:mo>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>−</mml:mo>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo>
<mml:mo>!</mml:mo>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ {\textit{NC}_{r}}=\frac{n!}{r!(n-r)!},\]]]></tex-math></alternatives>
</disp-formula> 
where <italic>n</italic> is the number of things to choose from, we choose <italic>r</italic> of them, with no repetition.</p>
<p>Table <xref rid="j_infor521_tab_002">2</xref> presents an example of the combination with no repetition under <inline-formula id="j_infor521_ineq_055"><alternatives><mml:math>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$n=4$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_056"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$r=1,2,3,4$]]></tex-math></alternatives></inline-formula>, and the <inline-formula id="j_infor521_ineq_057"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mtext mathvariant="italic">NC</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${\textit{NC}_{r}}$]]></tex-math></alternatives></inline-formula> value.</p>
<table-wrap id="j_infor521_tab_002">
<label>Table 2</label>
<caption>
<p>The example of a combined matrix.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_058"><alternatives><mml:math>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$n=4$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_059"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$r=1$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_060"><alternatives><mml:math>
<mml:mtext mathvariant="italic">NC</mml:mtext>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$\textit{NC}=4$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_061"><alternatives><mml:math>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$n=4$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_062"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>2</mml:mn></mml:math><tex-math><![CDATA[$r=2$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_063"><alternatives><mml:math>
<mml:mtext mathvariant="italic">NC</mml:mtext>
<mml:mo>=</mml:mo>
<mml:mn>6</mml:mn></mml:math><tex-math><![CDATA[$\textit{NC}=6$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_064"><alternatives><mml:math>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$n=4$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_065"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>3</mml:mn></mml:math><tex-math><![CDATA[$r=3$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_066"><alternatives><mml:math>
<mml:mtext mathvariant="italic">NC</mml:mtext>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$\textit{NC}=4$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_067"><alternatives><mml:math>
<mml:mi mathvariant="italic">n</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$n=4$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_068"><alternatives><mml:math>
<mml:mi mathvariant="italic">r</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[$r=4$]]></tex-math></alternatives></inline-formula>, <inline-formula id="j_infor521_ineq_069"><alternatives><mml:math>
<mml:mtext mathvariant="italic">NC</mml:mtext>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[$\textit{NC}=1$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_070"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_071"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_072"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_073"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_074"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_075"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_076"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_077"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_078"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_079"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_080"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_081"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_082"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_083"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_084"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_085"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"/>
</tr>
<tr>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_086"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_087"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_088"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"><inline-formula id="j_infor521_ineq_089"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{1}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_090"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_091"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left"/>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_092"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_093"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_094"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_095"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{2}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_096"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>3</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{3}}$]]></tex-math></alternatives></inline-formula> <inline-formula id="j_infor521_ineq_097"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">I</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>4</mml:mn>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${I_{4}}$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin"/>
</tr>
</tbody>
</table>
</table-wrap>
<p>Next, calculate the hiding capacity which is the same as the total number of a combined matrix and is defined by (<xref rid="j_infor521_eq_007">7</xref>): 
<disp-formula id="j_infor521_eq_007">
<label>(7)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true">
<mml:mtr>
<mml:mtd>
<mml:mtext mathvariant="italic">EC</mml:mtext>
<mml:mo>=</mml:mo>
<mml:munderover accentunder="false" accent="false">
<mml:mrow>
<mml:mstyle displaystyle="true">
<mml:mo largeop="true" movablelimits="false">∑</mml:mo></mml:mstyle>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">r</mml:mi>
</mml:mrow>
</mml:munderover>
<mml:msub>
<mml:mrow>
<mml:mtext mathvariant="italic">NC</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:msup>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">n</mml:mi>
</mml:mrow>
</mml:msup>
<mml:mo>−</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo>.</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[ \textit{EC}={\sum \limits_{i=1}^{r}}{\textit{NC}_{i}}={2^{n}}-1.\]]]></tex-math></alternatives>
</disp-formula>
</p>
<p>Finally, form a <italic>Combined Matrix</italic> = <inline-formula id="j_infor521_ineq_098"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">{</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>1</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mo>…</mml:mo>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">e</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo fence="true" stretchy="false">}</mml:mo></mml:math><tex-math><![CDATA[$\{{v^{\prime }_{1}},{v^{\prime }_{2}},\dots ,{v^{\prime }_{e}}\}$]]></tex-math></alternatives></inline-formula> 
<disp-formula id="j_infor521_eq_008">
<label>(8)</label><alternatives><mml:math display="block">
<mml:mtable displaystyle="true" columnalign="right left" columnspacing="0pt">
<mml:mtr>
<mml:mtd class="align-odd"/>
<mml:mtd class="align-even">
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msubsup>
<mml:mo>=</mml:mo>
<mml:mtext>avg pixel of the</mml:mtext>
<mml:mspace width="2.5pt"/>
<mml:msub>
<mml:mrow>
<mml:mtext mathvariant="italic">NC</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
</mml:mtd>
</mml:mtr>
<mml:mtr>
<mml:mtd class="align-odd">
<mml:mi mathvariant="italic">i</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mspace width="2.5pt"/>
<mml:mtext>to</mml:mtext>
<mml:mspace width="2.5pt"/>
<mml:mi mathvariant="italic">e</mml:mi>
<mml:mo mathvariant="normal">,</mml:mo>
</mml:mtd>
</mml:mtr>
</mml:mtable></mml:math><tex-math><![CDATA[\[\begin{aligned}{}& {v^{\prime }_{i}}=\text{avg pixel of the}\hspace{2.5pt}{\textit{NC}_{i}}\\ {} i=1\hspace{2.5pt}\text{to}\hspace{2.5pt}e,\end{aligned}\]]]></tex-math></alternatives>
</disp-formula> 
where <inline-formula id="j_infor521_ineq_099"><alternatives><mml:math>
<mml:mi mathvariant="italic">e</mml:mi>
<mml:mo>=</mml:mo>
<mml:mtext>the number of the</mml:mtext>
<mml:mspace width="2.5pt"/>
<mml:mtext mathvariant="italic">EC</mml:mtext></mml:math><tex-math><![CDATA[$e=\text{the number of the}\hspace{2.5pt}\textit{EC}$]]></tex-math></alternatives></inline-formula>.</p>
<list>
<list-item id="j_infor521_li_016">
<label>•</label>
<p>Preparation of Secret Data</p>
<list>
<list-item id="j_infor521_li_017">
<label>1.</label>
<p>Convert the secret data into a seven-binary format <inline-formula id="j_infor521_ineq_100"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula>;</p>
</list-item>
<list-item id="j_infor521_li_018">
<label>2.</label>
<p>Prepare <inline-formula id="j_infor521_ineq_101"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mtext mathvariant="italic">EC</mml:mtext></mml:math><tex-math><![CDATA[${M_{i}}=\textit{EC}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
</list>
</list-item>
<list-item id="j_infor521_li_019">
<label>•</label>
<p>Mapping</p>
<list>
<list-item id="j_infor521_li_020">
<label>1.</label>
<p>Identify the predefined key <italic>Q</italic> between a sender and receiver, where the length of <inline-formula id="j_infor521_ineq_102"><alternatives><mml:math>
<mml:mi mathvariant="italic">Q</mml:mi>
<mml:mo>=</mml:mo>
<mml:mtext mathvariant="italic">EC</mml:mtext></mml:math><tex-math><![CDATA[$Q=\textit{EC}$]]></tex-math></alternatives></inline-formula>.</p>
</list-item>
<list-item id="j_infor521_li_021">
<label>2.</label>
<p>Organize a mapping between <inline-formula id="j_infor521_ineq_103"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${M_{i}}$]]></tex-math></alternatives></inline-formula> and MSB of <inline-formula id="j_infor521_ineq_104"><alternatives><mml:math>
<mml:msubsup>
<mml:mrow>
<mml:mi mathvariant="italic">v</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mo>′</mml:mo>
</mml:mrow>
</mml:msubsup></mml:math><tex-math><![CDATA[${v^{\prime }_{i}}$]]></tex-math></alternatives></inline-formula> according to <italic>Q</italic>. Resulting mapping code <inline-formula id="j_infor521_ineq_105"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${Z_{i}}$]]></tex-math></alternatives></inline-formula>. The rule is shown in Table <xref rid="j_infor521_tab_002">2</xref>.</p>
</list-item>
</list>
</list-item>
</list>
<p>Suppose we have a cover image <italic>I</italic> of size <inline-formula id="j_infor521_ineq_106"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>8</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>8</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(8\times 8)$]]></tex-math></alternatives></inline-formula> pixels. Firstly, preprocess the cover image into a <inline-formula id="j_infor521_ineq_107"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(4\times 4)$]]></tex-math></alternatives></inline-formula> non-overlapping fragment, so the number of fragment <inline-formula id="j_infor521_ineq_108"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">S</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>4</mml:mn></mml:math><tex-math><![CDATA[${S_{i}}=4$]]></tex-math></alternatives></inline-formula>. Then form the combined matrix. The cover image preparation is presented in Fig. <xref rid="j_infor521_fig_005">5</xref>. Therefore, based on (<xref rid="j_infor521_eq_007">7</xref>), we can embed 15 bits of secret data. Suppose the character of secret data is A, B, and C, and the decimal value is 65, 66, and 67, respectively. Convert into seven-binary format <inline-formula id="j_infor521_ineq_109"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mspace width="2.5pt"/>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mspace width="2.5pt"/>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn></mml:math><tex-math><![CDATA[${M_{i}}=1,0,0,0,0,0,1,\hspace{2.5pt}1,0,0,0,0,1,0,\hspace{2.5pt}1,0,0,0,0,1,1$]]></tex-math></alternatives></inline-formula>. The embeddable <inline-formula id="j_infor521_ineq_110"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="bold-italic">M</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="bold-italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mn mathvariant="bold">1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mspace width="2.5pt"/>
<mml:mn mathvariant="bold">1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">0</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn mathvariant="bold">1</mml:mn></mml:math><tex-math><![CDATA[${\boldsymbol{M}_{\boldsymbol{i}}}=\mathbf{1},\mathbf{0},\mathbf{0},\mathbf{0},\mathbf{0},\mathbf{0},\mathbf{1},\hspace{2.5pt}\mathbf{1},\mathbf{0},\mathbf{0},\mathbf{0},\mathbf{0},\mathbf{1},\mathbf{0},\mathbf{1}$]]></tex-math></alternatives></inline-formula>.</p>
<p>Suppose the mapping key <inline-formula id="j_infor521_ineq_111"><alternatives><mml:math>
<mml:mi mathvariant="italic">Q</mml:mi>
<mml:mo>=</mml:mo>
<mml:mn>7</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>8</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>2</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>4</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>6</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mspace width="2.5pt"/>
<mml:mn>5</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>10</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>9</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>11</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>12</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>14</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>13</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>15</mml:mn></mml:math><tex-math><![CDATA[$Q=7,8,1,2,3,4,6,\hspace{2.5pt}5,10,9,11,12,14,13,15$]]></tex-math></alternatives></inline-formula>. Finally, based on the rule in Table <xref rid="j_infor521_tab_001">1</xref>, <inline-formula id="j_infor521_ineq_112"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Z</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub>
<mml:mo>=</mml:mo>
<mml:mtext mathvariant="bold">0 1 1 1 1 1 0 0 1 1 1 1 0 1 0</mml:mtext></mml:math><tex-math><![CDATA[${Z_{i}}=\textbf{0\hspace{0.17em}1\hspace{0.17em}1\hspace{0.17em}1\hspace{0.17em}1\hspace{0.17em}1\hspace{0.17em}0\hspace{0.17em}0\hspace{0.17em}1\hspace{0.17em}1\hspace{0.17em}1\hspace{0.17em}1\hspace{0.17em}0\hspace{0.17em}1\hspace{0.17em}0}$]]></tex-math></alternatives></inline-formula>, as shown in Fig. <xref rid="j_infor521_fig_006">6</xref>.</p>
<fig id="j_infor521_fig_004">
<label>Fig. 4</label>
<caption>
<p>The flowchart of the proposed combination theory-based scheme.</p>
</caption>
<graphic xlink:href="infor521_g004.jpg"/>
</fig>
<fig id="j_infor521_fig_005">
<label>Fig. 5</label>
<caption>
<p>An example of cover image preparation.</p>
</caption>
<graphic xlink:href="infor521_g005.jpg"/>
</fig>
<fig id="j_infor521_fig_006">
<label>Fig. 6</label>
<caption>
<p>An example of mapping.</p>
</caption>
<graphic xlink:href="infor521_g006.jpg"/>
</fig>
</sec>
</sec>
<sec id="j_infor521_s_009">
<label>4</label>
<title>Experimental Results</title>
<p>Experimental results were obtained by comparing the performance of CIHMSB (<xref ref-type="bibr" rid="j_infor521_ref_016">2022</xref>), CIHLHF (<xref ref-type="bibr" rid="j_infor521_ref_002">2023b</xref>), LMICS (<xref ref-type="bibr" rid="j_infor521_ref_009">2022</xref>), E-CIHMSB, and CB-CIHMSB. We experimented on the six test grayscale images: Airplane, Baboon, Barbara, Boat, Lena, and Pepper, as shown in Figs. <xref rid="j_infor521_fig_007">7</xref>(a)–(f), respectively.</p>
<fig id="j_infor521_fig_007">
<label>Fig. 7</label>
<caption>
<p>Test images.</p>
</caption>
<graphic xlink:href="infor521_g007.jpg"/>
</fig>
<sec id="j_infor521_s_010">
<label>4.1</label>
<title>Image Quality Assessment</title>
<p>The image quality assessment is shown in Table <xref rid="j_infor521_tab_004">4</xref>. As seen in Table <xref rid="j_infor521_tab_004">4</xref>, the SSIM and <inline-formula id="j_infor521_ineq_113"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Q</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${Q_{i}}$]]></tex-math></alternatives></inline-formula> of CIHMSB, LMICS, the proposed E-CIHMSB, and CB-CIHMSB schemes are equal to 1, which is also the optimal value. Therefore, it means the cover image is the same as the stego image. It indicated the schemes are coverless.</p>
<table-wrap id="j_infor521_tab_003">
<label>Table 3</label>
<caption>
<p>The comparison of image quality between CIHMSB, the proposed E-CIHMSB, and CB-CIHMSB schemes.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Methods</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">SSIM</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_114"><alternatives><mml:math>
<mml:msub>
<mml:mrow>
<mml:mi mathvariant="italic">Q</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mi mathvariant="italic">i</mml:mi>
</mml:mrow>
</mml:msub></mml:math><tex-math><![CDATA[${Q_{i}}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">CIHMSB (<xref ref-type="bibr" rid="j_infor521_ref_022">2020</xref>)</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">LMICS (<xref ref-type="bibr" rid="j_infor521_ref_009">2022</xref>)</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">E-CIHMSB</td>
<td style="vertical-align: top; text-align: left">1</td>
<td style="vertical-align: top; text-align: left">1</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">CB-CIHMSB</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">1</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="j_infor521_s_011">
<label>4.2</label>
<title>Hiding Capacity Assessment</title>
<p>As seen in Table <xref rid="j_infor521_tab_004">4</xref>, for cover image size 512 × 512 and the fragment size 8 × 8, the hiding capacity is 16384, 20480, and 61440 for CIHMSB (<xref ref-type="bibr" rid="j_infor521_ref_022">2020</xref>), CIHLHF (<xref ref-type="bibr" rid="j_infor521_ref_002">2023b</xref>), E-CIHMSB, and CB-CIHMSB, respectively. Figure <xref rid="j_infor521_fig_008">8</xref> presents the hiding capacity comparison of CIHMSB E-CIHMSB and CB-CIHMSB. It can be seen that E-CIHMSB’s capacity is 25% higher than CIHMSB’s. Moreover, CB-CIHMSB’s hiding capacity is 275% higher than CIHMSB and 125% higher than CIHLHF.</p>
<table-wrap id="j_infor521_tab_004">
<label>Table 4</label>
<caption>
<p>The comparison of hiding capacity between CIHMSB, the proposed E-CIHMSB, and CB-CIHMSB schemes.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Methods</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Bits</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin"><italic>carrirer</italic><sup>−1</sup></td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Hiding capacity <inline-formula id="j_infor521_ineq_115"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mtext mathvariant="italic">bits</mml:mtext>
<mml:mspace width="0.1667em"/>
<mml:mo>∗</mml:mo>
<mml:mspace width="0.1667em"/>
<mml:msup>
<mml:mrow>
<mml:mtext mathvariant="italic">carrirer</mml:mtext>
</mml:mrow>
<mml:mrow>
<mml:mo>−</mml:mo>
<mml:mn>1</mml:mn>
</mml:mrow>
</mml:msup>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(\textit{bits}\hspace{0.1667em}\ast \hspace{0.1667em}{\textit{carrirer}^{-1}})$]]></tex-math></alternatives></inline-formula></td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">CIHMSB (<xref ref-type="bibr" rid="j_infor521_ref_022">2020</xref>)</td>
<td style="vertical-align: top; text-align: left">4</td>
<td rowspan="4" style="vertical-align: middle; text-align: left; border-bottom: solid thin"><inline-formula id="j_infor521_ineq_116"><alternatives><mml:math><mml:mstyle displaystyle="false">
<mml:mfrac>
<mml:mrow>
<mml:mn>512</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>512</mml:mn>
</mml:mrow>
<mml:mrow>
<mml:mn>8</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>8</mml:mn>
</mml:mrow>
</mml:mfrac>
</mml:mstyle>
<mml:mo>=</mml:mo>
<mml:mn>4096</mml:mn></mml:math><tex-math><![CDATA[$\frac{512\times 512}{8\times 8}=4096$]]></tex-math></alternatives></inline-formula></td>
<td style="vertical-align: top; text-align: left">16384</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">CIHLHF (<xref ref-type="bibr" rid="j_infor521_ref_002">2023b</xref>)</td>
<td style="vertical-align: top; text-align: left">12</td>
<td style="vertical-align: top; text-align: left">49152</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">E-CIHMSB</td>
<td style="vertical-align: top; text-align: left">5</td>
<td style="vertical-align: top; text-align: left">20480</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">CB-CIHMSB</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">15</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">61440</td>
</tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="j_infor521_s_012">
<label>4.3</label>
<title>Robustness Analysis</title>
<p>In the AGWN attack, we define different intensities <inline-formula id="j_infor521_ineq_117"><alternatives><mml:math>
<mml:msup>
<mml:mrow>
<mml:mi mathvariant="italic">σ</mml:mi>
</mml:mrow>
<mml:mrow>
<mml:mn>2</mml:mn>
</mml:mrow>
</mml:msup></mml:math><tex-math><![CDATA[${\sigma ^{2}}$]]></tex-math></alternatives></inline-formula> 0.1, 0.5, and 1. In the robustness analysis under salt &amp; pepper noise attack, the noise density increases from 0.001 to 0.005. This experiment uses the average filtering technique to perform a robustness analysis against low-pass filtering attacks. The average filter’s size parameters range 3 × 3 and 5 × 5, with 3 × 3 representing the lowest attack and 5 × 5 representing the highest attack. The compression quality <inline-formula id="j_infor521_ineq_118"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">Q</mml:mi></mml:math><tex-math><![CDATA[$(Q$]]></tex-math></alternatives></inline-formula>) is used in this experiment to perform a robustness analysis against JPEG compression attacks. The JPEG compression quality <inline-formula id="j_infor521_ineq_119"><alternatives><mml:math>
<mml:mo mathvariant="normal" fence="true" stretchy="false">(</mml:mo>
<mml:mi mathvariant="italic">Q</mml:mi>
<mml:mo mathvariant="normal" fence="true" stretchy="false">)</mml:mo></mml:math><tex-math><![CDATA[$(Q)$]]></tex-math></alternatives></inline-formula> ranged 50, 70, and 90 in this experiment. Table <xref rid="j_infor521_tab_005">5</xref> provides information about the attack type and used parameters.</p>
<table-wrap id="j_infor521_tab_005">
<label>Table 5</label>
<caption>
<p>The type of attacks.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Attack type</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Parameters</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">Additive Gaussian White Noise (AGWN)</td>
<td style="vertical-align: top; text-align: left">Variance = <inline-formula id="j_infor521_ineq_120"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">{</mml:mo>
<mml:mn>0.1</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0.5</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>1</mml:mn>
<mml:mo fence="true" stretchy="false">}</mml:mo></mml:math><tex-math><![CDATA[$\{0.1,0.5,1\}$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Salt &amp; Pepper Noise (SPN)</td>
<td style="vertical-align: top; text-align: left">Variance = <inline-formula id="j_infor521_ineq_121"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">{</mml:mo>
<mml:mn>0.001</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>0.005</mml:mn>
<mml:mo fence="true" stretchy="false">}</mml:mo></mml:math><tex-math><![CDATA[$\{0.001,0.005\}$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">Low Pass Filtering: Average Filtering (AF)</td>
<td style="vertical-align: top; text-align: left">Window size = <inline-formula id="j_infor521_ineq_122"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">{</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>3</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>5</mml:mn>
<mml:mo>×</mml:mo>
<mml:mn>5</mml:mn>
<mml:mo fence="true" stretchy="false">}</mml:mo></mml:math><tex-math><![CDATA[$\{3\times 3,5\times 5\}$]]></tex-math></alternatives></inline-formula></td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">JPEG Compression</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">Quality factor = <inline-formula id="j_infor521_ineq_123"><alternatives><mml:math>
<mml:mo fence="true" stretchy="false">{</mml:mo>
<mml:mn>50</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>70</mml:mn>
<mml:mo mathvariant="normal">,</mml:mo>
<mml:mn>90</mml:mn>
<mml:mo fence="true" stretchy="false">}</mml:mo></mml:math><tex-math><![CDATA[$\{50,70,90\}$]]></tex-math></alternatives></inline-formula></td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Table <xref rid="j_infor521_tab_006">6</xref> presents the BER tendency of the CIHMSB, LMICS, E-CIHMSB, and B-CIHMSB. As shown in Table <xref rid="j_infor521_tab_006">6</xref>, the higher the noise intensity, the higher the BER.</p>
<table-wrap id="j_infor521_tab_006">
<label>Table 6</label>
<caption>
<p>The comparison of attacks performance.</p>
</caption>
<table>
<thead>
<tr>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">Attack</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">CIHMSB</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">LMICS</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">E-CIHMSB</td>
<td style="vertical-align: top; text-align: left; border-top: solid thin; border-bottom: solid thin">CB-CIHMSB</td>
</tr>
</thead>
<tbody>
<tr>
<td style="vertical-align: top; text-align: left">AGWN 0.1</td>
<td style="vertical-align: top; text-align: left">10.7583</td>
<td style="vertical-align: top; text-align: left">N.A</td>
<td style="vertical-align: top; text-align: left">9.6700</td>
<td style="vertical-align: top; text-align: left">7.9700</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">AGWN 0.5</td>
<td style="vertical-align: top; text-align: left">23.2117</td>
<td style="vertical-align: top; text-align: left">N.A</td>
<td style="vertical-align: top; text-align: left">21.2600</td>
<td style="vertical-align: top; text-align: left">18.4400</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">AGWN 1</td>
<td style="vertical-align: top; text-align: left">29.4633</td>
<td style="vertical-align: top; text-align: left">N.A</td>
<td style="vertical-align: top; text-align: left">27.1533</td>
<td style="vertical-align: top; text-align: left">24.5517</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">SPN 0.001</td>
<td style="vertical-align: top; text-align: left">0.1333</td>
<td style="vertical-align: top; text-align: left">0.0083</td>
<td style="vertical-align: top; text-align: left">0.12667</td>
<td style="vertical-align: top; text-align: left">0.12500</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">SPN 0.005</td>
<td style="vertical-align: top; text-align: left">0.4450</td>
<td style="vertical-align: top; text-align: left">0.0167</td>
<td style="vertical-align: top; text-align: left">0.42500</td>
<td style="vertical-align: top; text-align: left">0.40667</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">AF (3 × 3)</td>
<td style="vertical-align: top; text-align: left">0.9250</td>
<td style="vertical-align: top; text-align: left">0.0334</td>
<td style="vertical-align: top; text-align: left">0.8367</td>
<td style="vertical-align: top; text-align: left">0.6950</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">AF (5 × 5)</td>
<td style="vertical-align: top; text-align: left">2.0767</td>
<td style="vertical-align: top; text-align: left">0.0520</td>
<td style="vertical-align: top; text-align: left">1.8450</td>
<td style="vertical-align: top; text-align: left">1.5000</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">JPEG 50</td>
<td style="vertical-align: top; text-align: left">0.4817</td>
<td style="vertical-align: top; text-align: left">0.0134</td>
<td style="vertical-align: top; text-align: left">0.4517</td>
<td style="vertical-align: top; text-align: left">0.3833</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left">JPEG 70</td>
<td style="vertical-align: top; text-align: left">0.2983</td>
<td style="vertical-align: top; text-align: left">0.0115</td>
<td style="vertical-align: top; text-align: left">0.2683</td>
<td style="vertical-align: top; text-align: left">0.2400</td>
</tr>
<tr>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">JPEG 90</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.1117</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.0074</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.1033</td>
<td style="vertical-align: top; text-align: left; border-bottom: solid thin">0.1000</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>Figure <xref rid="j_infor521_fig_008">8</xref> shows the BER comparison value between CIHMSB, LMICS, E-CIHMSB, and CB-CIHMSB under AGWN attack. BER tendency of CB-CIHMSB and E-CIHMSB is lower than CIHMSB. It is proven that E-CIHMSB and CB-CIHMSB are more robust than CIHMSB under the AGWN attack.</p>
<fig id="j_infor521_fig_008">
<label>Fig. 8</label>
<caption>
<p>AGWN performance comparison.</p>
</caption>
<graphic xlink:href="infor521_g008.jpg"/>
</fig>
<p>Figure <xref rid="j_infor521_fig_009">9</xref> shows the BER comparison value between CIHMSB, LMICS, E-CIHMSB, and CB-CIHMSB under the Salt &amp; Pepper attack. BER tendency of CB-CIHMSB and E-CIHMSB is lower than CIHMSB. Generally, the proposed E-CIHMSB and CB-CIHMSB schemes are more robust than CIHMSB under the Salt &amp; Pepper attack.</p>
<fig id="j_infor521_fig_009">
<label>Fig. 9</label>
<caption>
<p>SPN performance comparison.</p>
</caption>
<graphic xlink:href="infor521_g009.jpg"/>
</fig>
<p>Figure <xref rid="j_infor521_fig_010">10</xref> shows the BER comparison value between CIHMSB, LMICS, E-CIHMSB, and CB-CIHMSB under a low-filtering attack. Again, the BER increases as the filtering size increases. BER tendency of CB-CIHMSB and E-CIHMSB is lower than CIHMSB. Therefore, the robustness of the proposed E-CIHMSB and CB-CIHMSB schemes under a low-filtering attack is greater than that of CIHMSB.</p>
<fig id="j_infor521_fig_010">
<label>Fig. 10</label>
<caption>
<p>AF performance comparison.</p>
</caption>
<graphic xlink:href="infor521_g010.jpg"/>
</fig>
<p>Figure <xref rid="j_infor521_fig_011">11</xref> depicts the BER between CIHMSB, LMICS, E-CIHMSB, and CB-CIHMSB schemes when subjected to a JPEG compression attack with varying <italic>Q</italic>. The BER increases as <italic>Q</italic> decreases. The proposed E-CIHMSB and CB-CIHMSB schemes are more resistant to JPEG compression than CIHMSB.</p>
<fig id="j_infor521_fig_011">
<label>Fig. 11</label>
<caption>
<p>JPEG compression performance comparison.</p>
</caption>
<graphic xlink:href="infor521_g011.jpg"/>
</fig>
</sec>
</sec>
<sec id="j_infor521_s_013">
<label>5</label>
<title>Conclusion</title>
<p>This study proposed two coverless information hiding methods, E-CIHMSB and CB-CIHMSB, to improve the CIHMSB method’s hiding capacity. The difference between the two methods is in creating the cover image. The first proposed method uses image segmentation to compute each average, after which the extended average value is calculated. The second proposed method, with the combination theory, is used to obtain a higher average value. The greater the number of average value, the greater the hiding capacity. We follow the mapping and sequencing operations for the first and second methods, respectively. We investigate the robustness of the proposed method under AWGN, Salt &amp; Pepper noise, low-pass filtering, and JPEG compression attacks. It has been demonstrated that the proposed method is resistant to steganalysis attacks. The experimental results show that our proposed method’s hiding capacity outperforms CIHMSB.</p>
</sec>
</body>
<back>
<ref-list id="j_infor521_reflist_001">
<title>References</title>
<ref id="j_infor521_ref_001">
<mixed-citation publication-type="journal"><string-name><surname>Anggriani</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>N.-I.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>M.-S.</given-names></string-name> (<year>2023</year>a). <article-title>Research on coverless image steganography</article-title>. <source>International Journal of Network Security</source>, <volume>25</volume>(<issue>1</issue>), <fpage>25</fpage>–<lpage>31</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.6633/IJNS.202301_25(1).03" xlink:type="simple">https://doi.org/10.6633/IJNS.202301_25(1).03</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_002">
<mixed-citation publication-type="journal"><string-name><surname>Anggriani</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Chiou</surname>, <given-names>S.-F.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>N.-I.</given-names></string-name>, <string-name><surname>Hwang</surname>, <given-names>M.-S.</given-names></string-name> (<year>2023</year>b). <article-title>A high-capacity coverless information hiding based on the lowest and highest image fragments</article-title>. <source>Electronics</source>, <volume>12</volume>, <fpage>395</fpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.3390/electronics12020395" xlink:type="simple">https://doi.org/10.3390/electronics12020395</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_003">
<mixed-citation publication-type="journal"><string-name><surname>Chen</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Qiu</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Xia</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Xiong</surname>, <given-names>N.N.</given-names></string-name> (<year>2022</year>). <article-title>Novel coverless steganography method based on image selection and StarGAN</article-title>. <source>IEEE Transactions on Network Science and Engineering</source>, <volume>9</volume>(<issue>1</issue>), <fpage>219</fpage>–<lpage>230</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TNSE.2020.3041529" xlink:type="simple">https://doi.org/10.1109/TNSE.2020.3041529</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_004">
<mixed-citation publication-type="journal"><string-name><surname>Cogranne</surname>, <given-names>R.</given-names></string-name>, <string-name><surname>Giboulot</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Bas</surname>, <given-names>P.</given-names></string-name> (<year>2022</year>). <article-title>Efficient steganography in JPEG images by minimizing performance of optimal detector</article-title>. <source>IEEE Transactions on Information Forensics and Security</source>, <volume>17</volume>, <fpage>1328</fpage>–<lpage>1343</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TIFS.2021.3111713" xlink:type="simple">https://doi.org/10.1109/TIFS.2021.3111713</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_005">
<mixed-citation publication-type="journal"><string-name><surname>Coleti</surname>, <given-names>T.A.</given-names></string-name>, <string-name><surname>Luiz</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Corrêa</surname>, <given-names>P.</given-names></string-name>, <string-name><surname>Vilela</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Filgueiras</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Morandini</surname>, <given-names>M.</given-names></string-name> (<year>2020</year>). <article-title>TR-model. A metadata profile application for personal data transparency</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>75184</fpage>–<lpage>75209</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2020.2988566" xlink:type="simple">https://doi.org/10.1109/ACCESS.2020.2988566</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_006">
<mixed-citation publication-type="journal"><string-name><surname>Iwaya</surname>, <given-names>L.H.</given-names></string-name>, <string-name><surname>Ahmad</surname>, <given-names>A.</given-names></string-name>, <string-name><surname>Babar</surname>, <given-names>M.A.</given-names></string-name> (<year>2020</year>). <article-title>Security and privacy for mHealth and uHealth systems: a systematic mapping study</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>150081</fpage>–<lpage>150112</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2020.3015962" xlink:type="simple">https://doi.org/10.1109/ACCESS.2020.3015962</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_007">
<mixed-citation publication-type="journal"><string-name><surname>Liang</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Quan</surname>, <given-names>D.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Jia</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>T.</given-names></string-name> (<year>2020</year>). <article-title>Financial big data analysis and early warning platform: a case study</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>36515</fpage>–<lpage>36526</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2020.2969039" xlink:type="simple">https://doi.org/10.1109/ACCESS.2020.2969039</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_008">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>Q.</given-names></string-name>, <string-name><surname>Xiang</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Qin</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Tan</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>Q.</given-names></string-name> (<year>2022</year>). <article-title>A robust coverless steganography scheme using camouflage image</article-title>. <source>IEEE Transactions on Circuits and Systems for Video Technology</source>, <volume>32</volume>(<issue>6</issue>), <fpage>4038</fpage>–<lpage>4051</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TCSVT.2021.3108772" xlink:type="simple">https://doi.org/10.1109/TCSVT.2021.3108772</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_009">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Li</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Ma</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Ding</surname>, <given-names>Y.</given-names></string-name> (<year>2022</year>). <article-title>Robust coverless steganography using limited mapping images</article-title>. <source>Journal of King Saud University – Computer and Information Sciences</source>, <volume>34</volume>(<issue>7</issue>), <fpage>4472</fpage>–<lpage>4482</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1016/j.jksuci.2022.05.012" xlink:type="simple">https://doi.org/10.1016/j.jksuci.2022.05.012</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_010">
<mixed-citation publication-type="journal"><string-name><surname>Liu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Ni</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>W.</given-names></string-name>, <string-name><surname>Huang</surname>, <given-names>J.</given-names></string-name> (<year>2022</year>). <article-title>A novel video steganographic scheme incorporating the consistency degree of motion vectors</article-title>. <source>IEEE Transactions on Circuits and Systems for Video Technology</source>, <volume>32</volume>(<issue>7</issue>), <fpage>4905</fpage>–<lpage>4910</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TCSVT.2021.3135384" xlink:type="simple">https://doi.org/10.1109/TCSVT.2021.3135384</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_011">
<mixed-citation publication-type="journal"><string-name><surname>Long</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Liu</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Ba</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Qin</surname>, <given-names>J.</given-names></string-name> (<year>2019</year>). <article-title>Coverless information hiding method based on web text</article-title>. <source>IEEE Access</source>, <volume>7</volume>, <fpage>31926</fpage>–<lpage>31933</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2019.2901260" xlink:type="simple">https://doi.org/10.1109/ACCESS.2019.2901260</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_012">
<mixed-citation publication-type="journal"><string-name><surname>Luo</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Qin</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Xiang</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Tan</surname>, <given-names>Y.</given-names></string-name> (<year>2021</year>). <article-title>Coverless image steganography based on multi-object recognition</article-title>. <source>IEEE Transactions on Circuits and Systems for Video Technology</source>, <volume>31</volume>(<issue>7</issue>), <fpage>2779</fpage>–<lpage>2791</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TCSVT.2020.3033945" xlink:type="simple">https://doi.org/10.1109/TCSVT.2020.3033945</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_013">
<mixed-citation publication-type="journal"><string-name><surname>Mahmoud</surname>, <given-names>M.M.</given-names></string-name>, <string-name><surname>Elshoush</surname>, <given-names>H.T.</given-names></string-name> (<year>2022</year>). <article-title>Enhancing LSB using binary message size encoding for high capacity, transparent and secure audio steganography—an innovative approach</article-title>. <source>IEEE Access</source>, <volume>10</volume>, <fpage>29954</fpage>–<lpage>29971</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2022.3155146" xlink:type="simple">https://doi.org/10.1109/ACCESS.2022.3155146</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_014">
<mixed-citation publication-type="journal"><string-name><surname>Mstafa</surname>, <given-names>R.J.</given-names></string-name>, <string-name><surname>Younis</surname>, <given-names>Y.M.</given-names></string-name>, <string-name><surname>Hussein</surname>, <given-names>H.I.</given-names></string-name>, <string-name><surname>Atto</surname>, <given-names>M.</given-names></string-name> (<year>2020</year>). <article-title>A new video steganography scheme based on Shi-Tomasi corner detector</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>161825</fpage>–<lpage>161837</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2020.3021356" xlink:type="simple">https://doi.org/10.1109/ACCESS.2020.3021356</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_015">
<mixed-citation publication-type="journal"><string-name><surname>Oh</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Park</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Lee</surname>, <given-names>G.M.</given-names></string-name>, <string-name><surname>Heo</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Choi</surname>, <given-names>J.K.</given-names></string-name> (<year>2019</year>). <article-title>Personal data trading scheme for data brokers in IoT data marketplaces</article-title>. <source>IEEE Access</source>, <volume>7</volume>, <fpage>40120</fpage>–<lpage>40132</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2019.2904248" xlink:type="simple">https://doi.org/10.1109/ACCESS.2019.2904248</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_016">
<mixed-citation publication-type="journal"><string-name><surname>Peng</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Chen</surname>, <given-names>G.</given-names></string-name>, <string-name><surname>Long</surname>, <given-names>M.</given-names></string-name> (<year>2022</year>). <article-title>A robust coverless steganography based on generative adversarial networks and gradient descent approximation</article-title>. <source>IEEE Transactions on Circuits and Systems for Video Technology</source>, <volume>32</volume>(<issue>9</issue>), <fpage>5817</fpage>–<lpage>5829</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TCSVT.2022.3161419" xlink:type="simple">https://doi.org/10.1109/TCSVT.2022.3161419</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_017">
<mixed-citation publication-type="journal"><string-name><surname>Qin</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Luo</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Xiang</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Tan</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Huang</surname>, <given-names>H.</given-names></string-name> (<year>2019</year>). <article-title>Coverless image steganography: a survey</article-title>. <source>IEEE Access</source>, <volume>7</volume>, <fpage>171372</fpage>–<lpage>171394</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2019.2955452" xlink:type="simple">https://doi.org/10.1109/ACCESS.2019.2955452</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_018">
<mixed-citation publication-type="journal"><string-name><surname>Saad</surname>, <given-names>A.H.S.</given-names></string-name>, <string-name><surname>Mohamed</surname>, <given-names>M.S.</given-names></string-name>, <string-name><surname>Hafez</surname>, <given-names>E.H.</given-names></string-name> (<year>2021</year>). <article-title>Coverless image steganography based on optical mark recognition and machine learning</article-title>. <source>IEEE Access</source>, <volume>9</volume>, <fpage>16522</fpage>–<lpage>16531</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2021.3050737" xlink:type="simple">https://doi.org/10.1109/ACCESS.2021.3050737</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_019">
<mixed-citation publication-type="journal"><string-name><surname>Stillman</surname>, <given-names>R.B.</given-names></string-name>, <string-name><surname>Defiore</surname>, <given-names>C.R.</given-names></string-name> (<year>1980</year>). <article-title>Computer security and networking protocols: technical issues in military data communications networks</article-title>. <source>IEEE Transactions on Communications</source>, <volume>28</volume>(<issue>9</issue>), <fpage>1472</fpage>–<lpage>1477</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TCOM.1980.1094838" xlink:type="simple">https://doi.org/10.1109/TCOM.1980.1094838</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_020">
<mixed-citation publication-type="journal"><string-name><surname>Wang</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Gao</surname>, <given-names>Q.</given-names></string-name> (<year>2019</year>). <article-title>A coverless plain text steganography based on character features</article-title>. <source>IEEE Access</source>, <volume>7</volume>, <fpage>95665</fpage>–<lpage>95676</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2019.2929123" xlink:type="simple">https://doi.org/10.1109/ACCESS.2019.2929123</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_021">
<mixed-citation publication-type="journal"><string-name><surname>Wang</surname>, <given-names>J.</given-names></string-name>, <string-name><surname>Jia</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Kang</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Shi</surname>, <given-names>Y.-Q.</given-names></string-name> (<year>2019</year>). <article-title>A cover selection HEVC video steganography based on intra prediction mode</article-title>. <source>IEEE Access</source>, <volume>7</volume>, <fpage>119393</fpage>–<lpage>119402</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2019.2936614" xlink:type="simple">https://doi.org/10.1109/ACCESS.2019.2936614</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_022">
<mixed-citation publication-type="journal"><string-name><surname>Yang</surname>, <given-names>L.</given-names></string-name>, <string-name><surname>Deng</surname>, <given-names>H.</given-names></string-name>, <string-name><surname>Dang</surname>, <given-names>X.</given-names></string-name> (<year>2020</year>). <article-title>A novel coverless information hiding method based on the most significant bit of the cover image</article-title>. <source>IEEE Access</source>, <volume>8</volume>, <fpage>108579</fpage>–<lpage>108591</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2020.3000993" xlink:type="simple">https://doi.org/10.1109/ACCESS.2020.3000993</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_023">
<mixed-citation publication-type="journal"><string-name><surname>Yi</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Yang</surname>, <given-names>K.</given-names></string-name>, <string-name><surname>Zhao</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Member</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Yu</surname>, <given-names>H.</given-names></string-name> (<year>2019</year>). <article-title>AHCM: adaptive Huffman code mapping for audio steganography based on psychoacoustic model</article-title>. <source>IEEE Transactions on Information Forensics and Security</source>, <volume>14</volume>(<issue>8</issue>), <fpage>2217</fpage>–<lpage>2231</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TIFS.2019.2895200" xlink:type="simple">https://doi.org/10.1109/TIFS.2019.2895200</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_024">
<mixed-citation publication-type="journal"><string-name><surname>Zhang</surname>, <given-names>X.</given-names></string-name>, <string-name><surname>Peng</surname>, <given-names>F.</given-names></string-name>, <string-name><surname>Long</surname>, <given-names>M.</given-names></string-name> (<year>2018</year>). <article-title>Robust coverless image steganography based on DCT and LDA topic classification</article-title>. <source>IEEE Transactions on Multimedia</source>, <volume>20</volume>(<issue>12</issue>), <fpage>3223</fpage>–<lpage>3238</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/TMM.2018.2838334" xlink:type="simple">https://doi.org/10.1109/TMM.2018.2838334</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_025">
<mixed-citation publication-type="journal"><string-name><surname>Zhou</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Cao</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Wang</surname>, <given-names>M.</given-names></string-name>, <string-name><surname>Fan</surname>, <given-names>E.</given-names></string-name>, <string-name><surname>Wu</surname>, <given-names>Q.M.J.</given-names></string-name> (<year>2019</year>). <article-title>Faster-RCNN based robust coverless information hiding system in cloud environment</article-title>. <source>IEEE Access</source>, <volume>7</volume>, <fpage>179891</fpage>–<lpage>179897</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/ACCESS.2019.2955990" xlink:type="simple">https://doi.org/10.1109/ACCESS.2019.2955990</ext-link>.</mixed-citation>
</ref>
<ref id="j_infor521_ref_026">
<mixed-citation publication-type="journal"><string-name><surname>Zhou</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Su</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Zhang</surname>, <given-names>Y.</given-names></string-name>, <string-name><surname>Xia</surname>, <given-names>Z.</given-names></string-name>, <string-name><surname>Du</surname>, <given-names>S.</given-names></string-name>, <string-name><surname>Gupta</surname>, <given-names>B.B.</given-names></string-name>, <string-name><surname>Qi</surname>, <given-names>L.</given-names></string-name> (<year>2022</year>). <article-title>Coverless information hiding based on probability graph learning for secure communication in IoT environment</article-title>. <source>IEEE Internet of Things Journal</source>, <volume>9</volume>(<issue>12</issue>), <fpage>9332</fpage>–<lpage>9341</lpage>. <ext-link ext-link-type="doi" xlink:href="https://doi.org/10.1109/JIOT.2021.3103779" xlink:type="simple">https://doi.org/10.1109/JIOT.2021.3103779</ext-link>.</mixed-citation>
</ref>
</ref-list>
</back>
</article>
